Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
Analysis ID:1521409
MD5:4e277b4187525cd19cd7269a4daf9fc1
SHA1:611a0b0711f3850958422680b9b662466e7e800a
SHA256:733ad8a06b4d21a85c29b76af4a89b22077292903fc3df7eb052d4f2027af99f
Tags:exe
Infos:

Detection

Socks5Systemz
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for dropped file
PE file has a writeable .text section
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe (PID: 7528 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe" MD5: 4E277B4187525CD19CD7269A4DAF9FC1)
    • SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp (PID: 7544 cmdline: "C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp" /SL5="$2046A,2942017,56832,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe" MD5: 5D678A5E268C0BAD90CD1584C53048AD)
      • playglock.exe (PID: 7572 cmdline: "C:\Users\user\AppData\Local\Play Glock\playglock.exe" -i MD5: 31590895739E872769BF62DD513196B7)
  • cleanup
{"C2 list": ["ddbnoae.info"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    00000002.00000002.2950521336.0000000002841000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: playglock.exe PID: 7572JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-28T09:25:55.540626+020020494671A Network Trojan was detected192.168.2.463624185.208.158.24880TCP
        2024-09-28T09:25:58.427061+020020494671A Network Trojan was detected192.168.2.463624185.208.158.24880TCP
        2024-09-28T09:25:58.781783+020020494671A Network Trojan was detected192.168.2.463624185.208.158.24880TCP
        2024-09-28T09:25:59.624548+020020494671A Network Trojan was detected192.168.2.463628185.208.158.24880TCP
        2024-09-28T09:26:00.434553+020020494671A Network Trojan was detected192.168.2.463629185.208.158.24880TCP
        2024-09-28T09:26:01.281941+020020494671A Network Trojan was detected192.168.2.463630185.208.158.24880TCP
        2024-09-28T09:26:02.092723+020020494671A Network Trojan was detected192.168.2.463631185.208.158.24880TCP
        2024-09-28T09:26:03.049963+020020494671A Network Trojan was detected192.168.2.463632185.208.158.24880TCP
        2024-09-28T09:26:03.410859+020020494671A Network Trojan was detected192.168.2.463632185.208.158.24880TCP
        2024-09-28T09:26:04.247928+020020494671A Network Trojan was detected192.168.2.463633185.208.158.24880TCP
        2024-09-28T09:26:05.051376+020020494671A Network Trojan was detected192.168.2.463634185.208.158.24880TCP
        2024-09-28T09:26:05.402850+020020494671A Network Trojan was detected192.168.2.463634185.208.158.24880TCP
        2024-09-28T09:26:06.221287+020020494671A Network Trojan was detected192.168.2.463635185.208.158.24880TCP
        2024-09-28T09:26:06.572307+020020494671A Network Trojan was detected192.168.2.463635185.208.158.24880TCP
        2024-09-28T09:26:07.388696+020020494671A Network Trojan was detected192.168.2.463636185.208.158.24880TCP
        2024-09-28T09:26:08.221257+020020494671A Network Trojan was detected192.168.2.463637185.208.158.24880TCP
        2024-09-28T09:26:08.860198+020020494671A Network Trojan was detected192.168.2.463637185.208.158.24880TCP
        2024-09-28T09:26:09.679607+020020494671A Network Trojan was detected192.168.2.463638185.208.158.24880TCP
        2024-09-28T09:26:10.500217+020020494671A Network Trojan was detected192.168.2.463639185.208.158.24880TCP
        2024-09-28T09:26:11.308851+020020494671A Network Trojan was detected192.168.2.463640185.208.158.24880TCP
        2024-09-28T09:26:12.376602+020020494671A Network Trojan was detected192.168.2.463641185.208.158.24880TCP
        2024-09-28T09:26:13.237350+020020494671A Network Trojan was detected192.168.2.463642185.208.158.24880TCP
        2024-09-28T09:26:13.584649+020020494671A Network Trojan was detected192.168.2.463642185.208.158.24880TCP
        2024-09-28T09:26:13.930705+020020494671A Network Trojan was detected192.168.2.463642185.208.158.24880TCP
        2024-09-28T09:26:14.767368+020020494671A Network Trojan was detected192.168.2.463643185.208.158.24880TCP
        2024-09-28T09:26:16.652444+020020494671A Network Trojan was detected192.168.2.463644185.208.158.24880TCP
        2024-09-28T09:26:17.730814+020020494671A Network Trojan was detected192.168.2.463645185.208.158.24880TCP
        2024-09-28T09:26:18.544748+020020494671A Network Trojan was detected192.168.2.463646185.208.158.24880TCP
        2024-09-28T09:26:19.350971+020020494671A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:19.693692+020020494671A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:20.039696+020020494671A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:20.680848+020020494671A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:21.509099+020020494671A Network Trojan was detected192.168.2.463648185.208.158.24880TCP
        2024-09-28T09:26:22.322391+020020494671A Network Trojan was detected192.168.2.463649185.208.158.24880TCP
        2024-09-28T09:26:23.835727+020020494671A Network Trojan was detected192.168.2.463650185.208.158.24880TCP
        2024-09-28T09:26:24.188683+020020494671A Network Trojan was detected192.168.2.463650185.208.158.24880TCP
        2024-09-28T09:26:24.988129+020020494671A Network Trojan was detected192.168.2.463651185.208.158.24880TCP
        2024-09-28T09:26:26.310503+020020494671A Network Trojan was detected192.168.2.463651185.208.158.24880TCP
        2024-09-28T09:26:27.125276+020020494671A Network Trojan was detected192.168.2.463652185.208.158.24880TCP
        2024-09-28T09:26:27.948092+020020494671A Network Trojan was detected192.168.2.463653185.208.158.24880TCP
        2024-09-28T09:26:28.766691+020020494671A Network Trojan was detected192.168.2.463654185.208.158.24880TCP
        2024-09-28T09:26:29.576544+020020494671A Network Trojan was detected192.168.2.463655185.208.158.24880TCP
        2024-09-28T09:26:30.401804+020020494671A Network Trojan was detected192.168.2.463656185.208.158.24880TCP
        2024-09-28T09:26:31.246416+020020494671A Network Trojan was detected192.168.2.463657185.208.158.24880TCP
        2024-09-28T09:26:32.056708+020020494671A Network Trojan was detected192.168.2.463658185.208.158.24880TCP
        2024-09-28T09:26:32.872983+020020494671A Network Trojan was detected192.168.2.463659185.208.158.24880TCP
        2024-09-28T09:26:33.718827+020020494671A Network Trojan was detected192.168.2.463660185.208.158.24880TCP
        2024-09-28T09:26:34.540230+020020494671A Network Trojan was detected192.168.2.463661185.208.158.24880TCP
        2024-09-28T09:26:35.370223+020020494671A Network Trojan was detected192.168.2.463662185.208.158.24880TCP
        2024-09-28T09:26:36.204093+020020494671A Network Trojan was detected192.168.2.463663185.208.158.24880TCP
        2024-09-28T09:26:36.562402+020020494671A Network Trojan was detected192.168.2.463663185.208.158.24880TCP
        2024-09-28T09:26:37.374139+020020494671A Network Trojan was detected192.168.2.463664185.208.158.24880TCP
        2024-09-28T09:26:38.186075+020020494671A Network Trojan was detected192.168.2.463665185.208.158.24880TCP
        2024-09-28T09:26:39.010930+020020494671A Network Trojan was detected192.168.2.463666185.208.158.24880TCP
        2024-09-28T09:26:39.872727+020020494671A Network Trojan was detected192.168.2.463667185.208.158.24880TCP
        2024-09-28T09:26:40.723914+020020494671A Network Trojan was detected192.168.2.463668185.208.158.24880TCP
        2024-09-28T09:26:41.075276+020020494671A Network Trojan was detected192.168.2.463668185.208.158.24880TCP
        2024-09-28T09:26:42.127712+020020494671A Network Trojan was detected192.168.2.463669185.208.158.24880TCP
        2024-09-28T09:26:42.487985+020020494671A Network Trojan was detected192.168.2.463669185.208.158.24880TCP
        2024-09-28T09:26:43.334326+020020494671A Network Trojan was detected192.168.2.463670185.208.158.24880TCP
        2024-09-28T09:26:43.688516+020020494671A Network Trojan was detected192.168.2.463670185.208.158.24880TCP
        2024-09-28T09:26:44.608533+020020494671A Network Trojan was detected192.168.2.463671185.208.158.24880TCP
        2024-09-28T09:26:45.465389+020020494671A Network Trojan was detected192.168.2.463672185.208.158.24880TCP
        2024-09-28T09:26:46.295276+020020494671A Network Trojan was detected192.168.2.463673185.208.158.24880TCP
        2024-09-28T09:26:47.122375+020020494671A Network Trojan was detected192.168.2.463674185.208.158.24880TCP
        2024-09-28T09:26:48.188351+020020494671A Network Trojan was detected192.168.2.463675185.208.158.24880TCP
        2024-09-28T09:26:49.027064+020020494671A Network Trojan was detected192.168.2.463676185.208.158.24880TCP
        2024-09-28T09:26:49.842755+020020494671A Network Trojan was detected192.168.2.463677185.208.158.24880TCP
        2024-09-28T09:26:50.662820+020020494671A Network Trojan was detected192.168.2.463678185.208.158.24880TCP
        2024-09-28T09:26:51.645002+020020494671A Network Trojan was detected192.168.2.463679185.208.158.24880TCP
        2024-09-28T09:26:52.464837+020020494671A Network Trojan was detected192.168.2.463680185.208.158.24880TCP
        2024-09-28T09:26:53.290624+020020494671A Network Trojan was detected192.168.2.463681185.208.158.24880TCP
        2024-09-28T09:26:54.126585+020020494671A Network Trojan was detected192.168.2.463682185.208.158.24880TCP
        2024-09-28T09:26:54.938947+020020494671A Network Trojan was detected192.168.2.463683185.208.158.24880TCP
        2024-09-28T09:26:55.744507+020020494671A Network Trojan was detected192.168.2.463684185.208.158.24880TCP
        2024-09-28T09:26:56.589229+020020494671A Network Trojan was detected192.168.2.463685185.208.158.24880TCP
        2024-09-28T09:26:57.424641+020020494671A Network Trojan was detected192.168.2.463686185.208.158.24880TCP
        2024-09-28T09:26:58.286158+020020494671A Network Trojan was detected192.168.2.463687185.208.158.24880TCP
        2024-09-28T09:26:59.236495+020020494671A Network Trojan was detected192.168.2.463688185.208.158.24880TCP
        2024-09-28T09:27:00.067537+020020494671A Network Trojan was detected192.168.2.463689185.208.158.24880TCP
        2024-09-28T09:27:00.898430+020020494671A Network Trojan was detected192.168.2.463690185.208.158.24880TCP
        2024-09-28T09:27:01.718700+020020494671A Network Trojan was detected192.168.2.463691185.208.158.24880TCP
        2024-09-28T09:27:02.693859+020020494671A Network Trojan was detected192.168.2.463692185.208.158.24880TCP
        2024-09-28T09:27:03.700537+020020494671A Network Trojan was detected192.168.2.463693185.208.158.24880TCP
        2024-09-28T09:27:04.554380+020020494671A Network Trojan was detected192.168.2.463694185.208.158.24880TCP
        2024-09-28T09:27:05.459809+020020494671A Network Trojan was detected192.168.2.463695185.208.158.24880TCP
        2024-09-28T09:27:06.288510+020020494671A Network Trojan was detected192.168.2.463696185.208.158.24880TCP
        2024-09-28T09:27:07.125952+020020494671A Network Trojan was detected192.168.2.463697185.208.158.24880TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-09-28T09:25:55.540626+020020501121A Network Trojan was detected192.168.2.463624185.208.158.24880TCP
        2024-09-28T09:25:58.427061+020020501121A Network Trojan was detected192.168.2.463624185.208.158.24880TCP
        2024-09-28T09:25:58.781783+020020501121A Network Trojan was detected192.168.2.463624185.208.158.24880TCP
        2024-09-28T09:25:59.624548+020020501121A Network Trojan was detected192.168.2.463628185.208.158.24880TCP
        2024-09-28T09:26:00.434553+020020501121A Network Trojan was detected192.168.2.463629185.208.158.24880TCP
        2024-09-28T09:26:01.281941+020020501121A Network Trojan was detected192.168.2.463630185.208.158.24880TCP
        2024-09-28T09:26:02.092723+020020501121A Network Trojan was detected192.168.2.463631185.208.158.24880TCP
        2024-09-28T09:26:03.049963+020020501121A Network Trojan was detected192.168.2.463632185.208.158.24880TCP
        2024-09-28T09:26:03.410859+020020501121A Network Trojan was detected192.168.2.463632185.208.158.24880TCP
        2024-09-28T09:26:04.247928+020020501121A Network Trojan was detected192.168.2.463633185.208.158.24880TCP
        2024-09-28T09:26:05.051376+020020501121A Network Trojan was detected192.168.2.463634185.208.158.24880TCP
        2024-09-28T09:26:05.402850+020020501121A Network Trojan was detected192.168.2.463634185.208.158.24880TCP
        2024-09-28T09:26:06.221287+020020501121A Network Trojan was detected192.168.2.463635185.208.158.24880TCP
        2024-09-28T09:26:06.572307+020020501121A Network Trojan was detected192.168.2.463635185.208.158.24880TCP
        2024-09-28T09:26:07.388696+020020501121A Network Trojan was detected192.168.2.463636185.208.158.24880TCP
        2024-09-28T09:26:08.221257+020020501121A Network Trojan was detected192.168.2.463637185.208.158.24880TCP
        2024-09-28T09:26:08.860198+020020501121A Network Trojan was detected192.168.2.463637185.208.158.24880TCP
        2024-09-28T09:26:09.679607+020020501121A Network Trojan was detected192.168.2.463638185.208.158.24880TCP
        2024-09-28T09:26:10.500217+020020501121A Network Trojan was detected192.168.2.463639185.208.158.24880TCP
        2024-09-28T09:26:11.308851+020020501121A Network Trojan was detected192.168.2.463640185.208.158.24880TCP
        2024-09-28T09:26:12.376602+020020501121A Network Trojan was detected192.168.2.463641185.208.158.24880TCP
        2024-09-28T09:26:13.237350+020020501121A Network Trojan was detected192.168.2.463642185.208.158.24880TCP
        2024-09-28T09:26:13.584649+020020501121A Network Trojan was detected192.168.2.463642185.208.158.24880TCP
        2024-09-28T09:26:13.930705+020020501121A Network Trojan was detected192.168.2.463642185.208.158.24880TCP
        2024-09-28T09:26:14.767368+020020501121A Network Trojan was detected192.168.2.463643185.208.158.24880TCP
        2024-09-28T09:26:16.652444+020020501121A Network Trojan was detected192.168.2.463644185.208.158.24880TCP
        2024-09-28T09:26:17.730814+020020501121A Network Trojan was detected192.168.2.463645185.208.158.24880TCP
        2024-09-28T09:26:18.544748+020020501121A Network Trojan was detected192.168.2.463646185.208.158.24880TCP
        2024-09-28T09:26:19.350971+020020501121A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:19.693692+020020501121A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:20.039696+020020501121A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:20.680848+020020501121A Network Trojan was detected192.168.2.463647185.208.158.24880TCP
        2024-09-28T09:26:21.509099+020020501121A Network Trojan was detected192.168.2.463648185.208.158.24880TCP
        2024-09-28T09:26:22.322391+020020501121A Network Trojan was detected192.168.2.463649185.208.158.24880TCP
        2024-09-28T09:26:23.835727+020020501121A Network Trojan was detected192.168.2.463650185.208.158.24880TCP
        2024-09-28T09:26:24.188683+020020501121A Network Trojan was detected192.168.2.463650185.208.158.24880TCP
        2024-09-28T09:26:24.988129+020020501121A Network Trojan was detected192.168.2.463651185.208.158.24880TCP
        2024-09-28T09:26:26.310503+020020501121A Network Trojan was detected192.168.2.463651185.208.158.24880TCP
        2024-09-28T09:26:27.125276+020020501121A Network Trojan was detected192.168.2.463652185.208.158.24880TCP
        2024-09-28T09:26:27.948092+020020501121A Network Trojan was detected192.168.2.463653185.208.158.24880TCP
        2024-09-28T09:26:28.766691+020020501121A Network Trojan was detected192.168.2.463654185.208.158.24880TCP
        2024-09-28T09:26:29.576544+020020501121A Network Trojan was detected192.168.2.463655185.208.158.24880TCP
        2024-09-28T09:26:30.401804+020020501121A Network Trojan was detected192.168.2.463656185.208.158.24880TCP
        2024-09-28T09:26:31.246416+020020501121A Network Trojan was detected192.168.2.463657185.208.158.24880TCP
        2024-09-28T09:26:32.056708+020020501121A Network Trojan was detected192.168.2.463658185.208.158.24880TCP
        2024-09-28T09:26:32.872983+020020501121A Network Trojan was detected192.168.2.463659185.208.158.24880TCP
        2024-09-28T09:26:33.718827+020020501121A Network Trojan was detected192.168.2.463660185.208.158.24880TCP
        2024-09-28T09:26:34.540230+020020501121A Network Trojan was detected192.168.2.463661185.208.158.24880TCP
        2024-09-28T09:26:35.370223+020020501121A Network Trojan was detected192.168.2.463662185.208.158.24880TCP
        2024-09-28T09:26:36.204093+020020501121A Network Trojan was detected192.168.2.463663185.208.158.24880TCP
        2024-09-28T09:26:36.562402+020020501121A Network Trojan was detected192.168.2.463663185.208.158.24880TCP
        2024-09-28T09:26:37.374139+020020501121A Network Trojan was detected192.168.2.463664185.208.158.24880TCP
        2024-09-28T09:26:38.186075+020020501121A Network Trojan was detected192.168.2.463665185.208.158.24880TCP
        2024-09-28T09:26:39.010930+020020501121A Network Trojan was detected192.168.2.463666185.208.158.24880TCP
        2024-09-28T09:26:39.872727+020020501121A Network Trojan was detected192.168.2.463667185.208.158.24880TCP
        2024-09-28T09:26:40.723914+020020501121A Network Trojan was detected192.168.2.463668185.208.158.24880TCP
        2024-09-28T09:26:41.075276+020020501121A Network Trojan was detected192.168.2.463668185.208.158.24880TCP
        2024-09-28T09:26:42.127712+020020501121A Network Trojan was detected192.168.2.463669185.208.158.24880TCP
        2024-09-28T09:26:42.487985+020020501121A Network Trojan was detected192.168.2.463669185.208.158.24880TCP
        2024-09-28T09:26:43.334326+020020501121A Network Trojan was detected192.168.2.463670185.208.158.24880TCP
        2024-09-28T09:26:43.688516+020020501121A Network Trojan was detected192.168.2.463670185.208.158.24880TCP
        2024-09-28T09:26:44.608533+020020501121A Network Trojan was detected192.168.2.463671185.208.158.24880TCP
        2024-09-28T09:26:45.465389+020020501121A Network Trojan was detected192.168.2.463672185.208.158.24880TCP
        2024-09-28T09:26:46.295276+020020501121A Network Trojan was detected192.168.2.463673185.208.158.24880TCP
        2024-09-28T09:26:47.122375+020020501121A Network Trojan was detected192.168.2.463674185.208.158.24880TCP
        2024-09-28T09:26:48.188351+020020501121A Network Trojan was detected192.168.2.463675185.208.158.24880TCP
        2024-09-28T09:26:49.027064+020020501121A Network Trojan was detected192.168.2.463676185.208.158.24880TCP
        2024-09-28T09:26:49.842755+020020501121A Network Trojan was detected192.168.2.463677185.208.158.24880TCP
        2024-09-28T09:26:50.662820+020020501121A Network Trojan was detected192.168.2.463678185.208.158.24880TCP
        2024-09-28T09:26:51.645002+020020501121A Network Trojan was detected192.168.2.463679185.208.158.24880TCP
        2024-09-28T09:26:52.464837+020020501121A Network Trojan was detected192.168.2.463680185.208.158.24880TCP
        2024-09-28T09:26:53.290624+020020501121A Network Trojan was detected192.168.2.463681185.208.158.24880TCP
        2024-09-28T09:26:54.126585+020020501121A Network Trojan was detected192.168.2.463682185.208.158.24880TCP
        2024-09-28T09:26:54.938947+020020501121A Network Trojan was detected192.168.2.463683185.208.158.24880TCP
        2024-09-28T09:26:55.744507+020020501121A Network Trojan was detected192.168.2.463684185.208.158.24880TCP
        2024-09-28T09:26:56.589229+020020501121A Network Trojan was detected192.168.2.463685185.208.158.24880TCP
        2024-09-28T09:26:57.424641+020020501121A Network Trojan was detected192.168.2.463686185.208.158.24880TCP
        2024-09-28T09:26:58.286158+020020501121A Network Trojan was detected192.168.2.463687185.208.158.24880TCP
        2024-09-28T09:26:59.236495+020020501121A Network Trojan was detected192.168.2.463688185.208.158.24880TCP
        2024-09-28T09:27:00.067537+020020501121A Network Trojan was detected192.168.2.463689185.208.158.24880TCP
        2024-09-28T09:27:00.898430+020020501121A Network Trojan was detected192.168.2.463690185.208.158.24880TCP
        2024-09-28T09:27:01.718700+020020501121A Network Trojan was detected192.168.2.463691185.208.158.24880TCP
        2024-09-28T09:27:02.693859+020020501121A Network Trojan was detected192.168.2.463692185.208.158.24880TCP
        2024-09-28T09:27:03.700537+020020501121A Network Trojan was detected192.168.2.463693185.208.158.24880TCP
        2024-09-28T09:27:04.554380+020020501121A Network Trojan was detected192.168.2.463694185.208.158.24880TCP
        2024-09-28T09:27:05.459809+020020501121A Network Trojan was detected192.168.2.463695185.208.158.24880TCP
        2024-09-28T09:27:06.288510+020020501121A Network Trojan was detected192.168.2.463696185.208.158.24880TCP
        2024-09-28T09:27:07.125952+020020501121A Network Trojan was detected192.168.2.463697185.208.158.24880TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: playglock.exe.7572.2.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["ddbnoae.info"]}
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeReversingLabs: Detection: 13%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeJoe Sandbox ML: detected
        Source: C:\ProgramData\Edrax Smart Maker 9.28.43\Edrax Smart Maker 9.28.43.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045D230 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D230
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045D2E4 ArcFourCrypt,1_2_0045D2E4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045D2FC ArcFourCrypt,1_2_0045D2FC
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

        Compliance

        barindex
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeUnpacked PE file: 2.2.playglock.exe.400000.0.unpack
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1Jump to behavior
        Source: Binary string: msvcp71.pdbx# source: is-BEBPU.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-4JU3B.tmp.1.dr
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-GF0FM.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-BEBPU.tmp.1.dr
        Source: Binary string: msvcr71.pdb source: is-4JU3B.tmp.1.dr
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004753C4 FindFirstFileA,FindNextFileA,FindClose,1_2_004753C4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00464200 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464200
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0049877C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049877C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004627F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004627F8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00463D84 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463D84

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63628 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63628 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63631 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63631 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63629 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63629 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63624 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63624 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63636 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63636 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63630 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63630 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63649 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63649 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63642 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63655 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63641 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63641 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63665 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63665 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63654 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63654 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63658 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63658 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63668 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63668 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63646 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63646 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63644 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63644 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63639 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63639 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63655 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63672 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63637 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63647 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63647 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63643 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63681 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63681 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63643 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63637 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63693 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63672 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63693 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63642 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63662 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63662 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63656 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63692 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63692 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63683 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63683 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63633 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63648 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63648 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63633 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63632 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63638 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63632 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63638 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63656 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63651 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63667 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63634 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63685 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63651 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63667 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63682 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63682 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63671 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63671 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63687 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63687 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63685 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63675 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63675 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63640 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63640 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63691 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63673 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63653 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63661 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63635 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63661 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63634 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63670 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63691 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63673 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63670 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63669 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63669 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63664 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63635 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63680 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63680 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63650 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63653 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63694 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63694 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63645 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63645 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63652 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63652 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63650 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63686 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63686 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63664 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63695 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63695 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63663 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63663 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63666 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63666 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63684 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63684 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63679 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63657 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63657 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63679 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63690 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63690 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63697 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63697 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63676 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63676 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63688 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63688 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63659 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63659 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63696 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63660 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63696 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63660 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63674 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63674 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63677 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63677 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63678 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63678 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:63689 -> 185.208.158.248:80
        Source: Network trafficSuricata IDS: 2050112 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:63689 -> 185.208.158.248:80
        Source: Malware configuration extractorURLs: ddbnoae.info
        Source: global trafficTCP traffic: 192.168.2.4:63625 -> 195.154.173.35:2023
        Source: Joe Sandbox ViewIP Address: 185.208.158.248 185.208.158.248
        Source: Joe Sandbox ViewIP Address: 195.154.173.35 195.154.173.35
        Source: Joe Sandbox ViewASN Name: SIMPLECARRER2IT SIMPLECARRER2IT
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf814c0e7969c3a HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownTCP traffic detected without corresponding DNS query: 195.154.173.35
        Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C572AB Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,_sprintf,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_free,2_2_02C572AB
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf814c0e7969c3a HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficHTTP traffic detected: GET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1Host: ddbnoae.infoUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
        Source: global trafficDNS traffic detected: DNS query: ddbnoae.info
        Source: playglock.exe, 00000002.00000002.2950078740.0000000000B10000.00000004.00000020.00020000.00000000.sdmp, playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.1
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/s
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f12
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd8
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e=
        Source: playglock.exe, 00000002.00000002.2950078740.0000000000B10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82d
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78Q
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28dd86d55f128470aac1p
        Source: playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.208.158.248/search/?q=67e28ddr
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000002.2950356959.0000000005F14000.00000004.00001000.00020000.00000000.sdmp, playglock.exe, 00000002.00000003.1699593553.0000000002773000.00000004.00000020.00020000.00000000.sdmp, playglock.exe, 00000002.00000000.1698919361.0000000000638000.00000002.00000001.01000000.00000009.sdmp, playglock.exe.1.dr, is-HQ21L.tmp.1.dr, Edrax Smart Maker 9.28.43.exe.2.drString found in binary or memory: http://acritum.com/ocb/
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://crl.certum.pl/cscasha2.crl0q
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://cscasha2.ocsp-certum.com04
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://ocsp.comodoca.com0
        Source: is-GF0FM.tmp.1.drString found in binary or memory: http://ocsp.sectigo.com0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ocsp.thawte.com0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://repository.certum.pl/cscasha2.cer0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://repository.certum.pl/ctnca.cer09
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://s.symcd.com06
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://subca.ocsp-certum.com01
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://www.certum.pl/CPS0
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000000.1687458246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.dr, is-AD0QP.tmp.1.drString found in binary or memory: http://www.innosetup.com/
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: http://www.openssl.org/f
        Source: is-RLF2N.tmp.1.drString found in binary or memory: http://www.openssl.org/support/faq.html
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686470686.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686645413.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000000.1687458246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.dr, is-AD0QP.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686470686.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686645413.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000000.1687458246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.dr, is-AD0QP.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: https://d.symcb.com/cps0%
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: https://d.symcb.com/rpa0.
        Source: is-GF0FM.tmp.1.drString found in binary or memory: https://sectigo.com/CPS0
        Source: is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drString found in binary or memory: https://www.certum.pl/CPS0
        Source: is-GF0FM.tmp.1.drString found in binary or memory: https://www.openssl.org/H

        System Summary

        barindex
        Source: playglock.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: Edrax Smart Maker 9.28.43.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0042F594 NtdllDefWindowProc_A,1_2_0042F594
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00423B94 NtdllDefWindowProc_A,1_2_00423B94
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004125E8 NtdllDefWindowProc_A,1_2_004125E8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00478EFC NtdllDefWindowProc_A,1_2_00478EFC
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045763C PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_0045763C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0042E944: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E944
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_0040840C0_2_0040840C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004708A01_2_004708A0
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00480E7E1_2_00480E7E
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0043533C1_2_0043533C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0046744C1_2_0046744C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004880141_2_00488014
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004303D01_2_004303D0
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0048E4AC1_2_0048E4AC
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0044453C1_2_0044453C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004346381_2_00434638
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00444AE41_2_00444AE4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00430F5C1_2_00430F5C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004870B41_2_004870B4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045F16C1_2_0045F16C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004451DC1_2_004451DC
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045B21C1_2_0045B21C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004694C81_2_004694C8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004455E81_2_004455E8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00451A301_2_00451A30
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0043DDC41_2_0043DDC4
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_004010512_2_00401051
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_00401C262_2_00401C26
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C6E18D2_2_02C6E18D
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C69E842_2_02C69E84
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C74E292_2_02C74E29
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C5EFB12_2_02C5EFB1
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C6DC992_2_02C6DC99
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C684422_2_02C68442
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C6AC3A2_2_02C6AC3A
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C6E5A52_2_02C6E5A5
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C72DB42_2_02C72DB4
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C940A22_2_02C940A2
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C8B9502_2_02C8B950
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C8BCEB2_2_02C8BCEB
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C8B4E52_2_02C8B4E5
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C8BD582_2_02C8BD58
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00408C1C appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00406AD4 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 0040596C appears 117 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00407904 appears 43 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00403400 appears 60 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00445E48 appears 45 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00457FC4 appears 77 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00457DB8 appears 105 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00434550 appears 32 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00403494 appears 83 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 004533B8 appears 98 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00446118 appears 59 times
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: String function: 00403684 appears 227 times
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: String function: 02C68AE0 appears 37 times
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: String function: 02C75330 appears 138 times
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-AD0QP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
        Source: is-AD0QP.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
        Source: is-AD0QP.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
        Source: is-E31ID.tmp.1.drStatic PE information: Number of sections : 11 > 10
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686470686.00000000023F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686645413.00000000021C8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
        Source: classification engineClassification label: mal100.troj.evad.winEXE@5/26@1/2
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C608B8 FormatMessageA,GetLastError,2_2_02C608B8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045568C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_0045568C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00455EB4 GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455EB4
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: CreateServiceA,CloseServiceHandle,2_2_0040B202
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0046E1E4 GetVersion,CoCreateInstance,1_2_0046E1E4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_004024E9 lstrcmpiW,SetEvent,ExitProcess,StartServiceCtrlDispatcherA,2_2_004024E9
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_004024E9 lstrcmpiW,SetEvent,ExitProcess,StartServiceCtrlDispatcherA,2_2_004024E9
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_004021BF GetCommandLineW,CommandLineToArgvW,GetLocalTime,lstrcmpiW,StartServiceCtrlDispatcherA,2_2_004021BF
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_004021BF GetCommandLineW,CommandLineToArgvW,GetLocalTime,lstrcmpiW,StartServiceCtrlDispatcherA,2_2_004021BF
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeFile created: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmpJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile read: C:\Windows\win.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeReversingLabs: Detection: 13%
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeString found in binary or memory: /LOADINF="filename"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeProcess created: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp "C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp" /SL5="$2046A,2942017,56832,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe"
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess created: C:\Users\user\AppData\Local\Play Glock\playglock.exe "C:\Users\user\AppData\Local\Play Glock\playglock.exe" -i
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeProcess created: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp "C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp" /SL5="$2046A,2942017,56832,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe" Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess created: C:\Users\user\AppData\Local\Play Glock\playglock.exe "C:\Users\user\AppData\Local\Play Glock\playglock.exe" -iJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: msacm32.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: explorerframe.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: sfc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: sfc_os.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: dsound.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: powrprof.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: winmmbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: umpdc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: appxsip.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: opcservices.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpWindow found: window name: TMainFormJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Play Glock_is1Jump to behavior
        Source: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeStatic file information: File size 3208313 > 1048576
        Source: Binary string: msvcp71.pdbx# source: is-BEBPU.tmp.1.dr
        Source: Binary string: msvcr71.pdb< source: is-4JU3B.tmp.1.dr
        Source: Binary string: F:\Temp\openssl-1.1.1t\libssl-1_1.pdb source: is-GF0FM.tmp.1.dr
        Source: Binary string: msvcp71.pdb source: is-BEBPU.tmp.1.dr
        Source: Binary string: msvcr71.pdb source: is-4JU3B.tmp.1.dr

        Data Obfuscation

        barindex
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeUnpacked PE file: 2.2.playglock.exe.400000.0.unpack .text:EW;.rdata:R;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeUnpacked PE file: 2.2.playglock.exe.400000.0.unpack
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: is-E31ID.tmp.1.drStatic PE information: section name: .eh_fram
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0048446C push 0048457Ah; ret 1_2_00484572
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0040995C push 00409999h; ret 1_2_00409991
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00458060 push 00458098h; ret 1_2_00458090
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004062C4 push ecx; mov dword ptr [esp], eax1_2_004062C5
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004104F0 push ecx; mov dword ptr [esp], edx1_2_004104F5
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00412938 push 0041299Bh; ret 1_2_00412993
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0049AD30 pushad ; retf 1_2_0049AD3F
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0040CE48 push ecx; mov dword ptr [esp], edx1_2_0040CE4A
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00459378 push 004593BCh; ret 1_2_004593B4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00495384 push ecx; mov dword ptr [esp], ecx1_2_00495389
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0040F3A8 push ecx; mov dword ptr [esp], edx1_2_0040F3AA
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004434B4 push ecx; mov dword ptr [esp], ecx1_2_004434B8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045186C push 0045189Fh; ret 1_2_00451897
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00451A30 push ecx; mov dword ptr [esp], eax1_2_00451A35
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00485B5C push ecx; mov dword ptr [esp], ecx1_2_00485B61
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00419C38 push ecx; mov dword ptr [esp], ecx1_2_00419C3D
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0045FDC4 push ecx; mov dword ptr [esp], ecx1_2_0045FDC8

        Persistence and Installation Behavior

        barindex
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02C5F7DA
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\Qt5OpenGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeFile created: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeFile created: C:\ProgramData\Edrax Smart Maker 9.28.43\Edrax Smart Maker 9.28.43.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\uninstall\is-AD0QP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\is-BEBPU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\playglock.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\is-E31ID.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\is-4JU3B.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\is-RLF2N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\is-F9BNG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpFile created: C:\Users\user\AppData\Local\Play Glock\is-GF0FM.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeFile created: C:\ProgramData\Edrax Smart Maker 9.28.43\Edrax Smart Maker 9.28.43.exeJump to dropped file

        Boot Survival

        barindex
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_00401A4F
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive02_2_02C5F7DA
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_004024E9 lstrcmpiW,SetEvent,ExitProcess,StartServiceCtrlDispatcherA,2_2_004024E9
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00423C1C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C1C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004241EC IsIconic,SetActiveWindow,SetFocus,1_2_004241EC
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004241A4 IsIconic,SetActiveWindow,1_2_004241A4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00418394 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418394
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0042286C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042286C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0042F2F0 IsIconic,GetWindowLongA,GetWindowLongA,GetActiveWindow,MessageBoxA,SetActiveWindow,GetActiveWindow,MessageBoxA,SetActiveWindow,1_2_0042F2F0
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004175A8 IsIconic,GetCapture,1_2_004175A8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00417CDE IsIconic,SetWindowPos,1_2_00417CDE
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00417CE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CE0
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00483E20 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_00483E20
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0041F128 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F128
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_00401B4B
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,2_2_02C5F8DE
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeWindow / User API: threadDelayed 7069Jump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeWindow / User API: threadDelayed 2793Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\Qt5OpenGL.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_shfoldr.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\libssl-1_1.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\is-BEBPU.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\uninstall\is-AD0QP.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\msvcr71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\is-E31ID.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\ssleay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\uninstall\unins000.exe (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\msvcp71.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\is-4JU3B.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_iscrypt.dllJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\libeay32.dll (copy)Jump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_setup64.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\is-RLF2N.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\is-F9BNG.tmpJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Play Glock\is-GF0FM.tmpJump to dropped file
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5966
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exe TID: 7576Thread sleep count: 7069 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exe TID: 7576Thread sleep time: -14138000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exe TID: 8048Thread sleep count: 65 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exe TID: 8048Thread sleep time: -3900000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exe TID: 7576Thread sleep count: 2793 > 30Jump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exe TID: 7576Thread sleep time: -5586000s >= -30000sJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeFile opened: PhysicalDrive0Jump to behavior
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00452AD4 FindFirstFileA,GetLastError,1_2_00452AD4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004753C4 FindFirstFileA,FindNextFileA,FindClose,1_2_004753C4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00464200 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464200
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0049877C FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_0049877C
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_004627F8 FindFirstFileA,FindNextFileA,FindClose,1_2_004627F8
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00463D84 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463D84
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeThread delayed: delay time: 60000Jump to behavior
        Source: playglock.exe, 00000002.00000002.2950078740.0000000000B19000.00000004.00000020.00020000.00000000.sdmp, playglock.exe, 00000002.00000002.2951101769.0000000003320000.00000004.00000020.00020000.00000000.sdmp, playglock.exe, 00000002.00000002.2950078740.0000000000A28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeAPI call chain: ExitProcess graph end nodegraph_0-6763
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C700FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02C700FE
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C700FE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,2_2_02C700FE
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00450334 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00450334
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C5648B RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,2_2_02C5648B
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C69468 SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_02C69468
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00478940 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478940
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0042EE28 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexA,1_2_0042EE28
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_0042E0AC AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E0AC
        Source: C:\Users\user\AppData\Local\Play Glock\playglock.exeCode function: 2_2_02C5F792 cpuid 2_2_02C5F792
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: GetLocaleInfoA,0_2_0040520C
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: GetLocaleInfoA,0_2_00405258
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: GetLocaleInfoA,1_2_00408578
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: GetLocaleInfoA,1_2_004085C4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00458670 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_00458670
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
        Source: C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmpCode function: 1_2_00455644 GetUserNameA,1_2_00455644
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2950521336.0000000002841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: playglock.exe PID: 7572, type: MEMORYSTR

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.2950521336.0000000002841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: playglock.exe PID: 7572, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts2
        Command and Scripting Interpreter
        5
        Windows Service
        1
        DLL Side-Loading
        2
        Obfuscated Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop ProtocolData from Removable Media2
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain Accounts2
        Service Execution
        1
        Bootkit
        1
        Access Token Manipulation
        2
        Software Packing
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared Drive1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
        Windows Service
        1
        DLL Side-Loading
        NTDS35
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
        Process Injection
        1
        Masquerading
        LSA Secrets41
        Security Software Discovery
        SSHKeylogging112
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
        Virtualization/Sandbox Evasion
        Cached Domain Credentials1
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        Access Token Manipulation
        DCSync21
        Virtualization/Sandbox Evasion
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
        Process Injection
        Proc Filesystem11
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
        Bootkit
        /etc/passwd and /etc/shadow3
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
        Remote System Discovery
        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
        System Network Configuration Discovery
        Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe13%ReversingLabsWin32.Trojan.Munp
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Play Glock\playglock.exe100%Joe Sandbox ML
        C:\ProgramData\Edrax Smart Maker 9.28.43\Edrax Smart Maker 9.28.43.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Play Glock\Qt5OpenGL.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\is-4JU3B.tmp5%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\is-BEBPU.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\is-E31ID.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\is-F9BNG.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\is-GF0FM.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\is-RLF2N.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\libeay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\libssl-1_1.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\msvcp71.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\msvcr71.dll (copy)5%ReversingLabs
        C:\Users\user\AppData\Local\Play Glock\ssleay32.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_iscrypt.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_setup64.tmp0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\is-OIG3T.tmp\_isetup\_shfoldr.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://www.innosetup.com/0%URL Reputationsafe
        https://sectigo.com/CPS00%URL Reputationsafe
        http://repository.certum.pl/ctnca.cer090%URL Reputationsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
        http://ocsp.sectigo.com00%URL Reputationsafe
        http://crl.certum.pl/ctnca.crl0k0%URL Reputationsafe
        http://ocsp.thawte.com00%URL Reputationsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
        http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
        https://www.certum.pl/CPS00%URL Reputationsafe
        http://www.openssl.org/support/faq.html0%URL Reputationsafe
        http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
        http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
        http://subca.ocsp-certum.com010%URL Reputationsafe
        https://www.openssl.org/H0%URL Reputationsafe
        http://www.remobjects.com/ps0%URL Reputationsafe
        http://www.openssl.org/f0%URL Reputationsafe
        http://www.certum.pl/CPS00%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        ddbnoae.info
        185.208.158.248
        truetrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://ddbnoae.info/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf814c0e7969c3atrue
            unknown
            ddbnoae.infotrue
              unknown
              http://ddbnoae.info/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017true
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.innosetup.com/SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000000.1687458246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.dr, is-AD0QP.tmp.1.drfalse
                • URL Reputation: safe
                unknown
                http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://sectigo.com/CPS0is-GF0FM.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://repository.certum.pl/ctnca.cer09is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://185.208.158.248/search/?q=67e28ddrplayglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://repository.certum.pl/cscasha2.cer0is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                      unknown
                      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0is-GF0FM.tmp.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0is-GF0FM.tmp.1.drfalse
                      • URL Reputation: safe
                      unknown
                      http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82dplayglock.exe, 00000002.00000002.2950078740.0000000000B10000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://crl.certum.pl/ctnca.crl0kis-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exefalse
                          unknown
                          http://ocsp.thawte.com0is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                          • URL Reputation: safe
                          unknown
                          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#is-GF0FM.tmp.1.drfalse
                          • URL Reputation: safe
                          unknown
                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exefalse
                            unknown
                            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#is-GF0FM.tmp.1.drfalse
                            • URL Reputation: safe
                            unknown
                            https://www.certum.pl/CPS0is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.certum.pl/cscasha2.crl0qis-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                              unknown
                              http://185.208.158.248/search/?qplayglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd8playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://cscasha2.ocsp-certum.com04is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                                    unknown
                                    http://www.openssl.org/support/faq.htmlis-RLF2N.tmp.1.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tis-GF0FM.tmp.1.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://185.208.158.248/splayglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://www.remobjects.com/psUSecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686470686.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686645413.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000000.1687458246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.dr, is-AD0QP.tmp.1.drfalse
                                        unknown
                                        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yis-GF0FM.tmp.1.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.thawte.com/ThawteTimestampingCA.crl0is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://185.208.158.248/search/?q=67e28dd86d55f128470aac1pplayglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://acritum.com/ocb/SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000002.2950356959.0000000005F14000.00000004.00001000.00020000.00000000.sdmp, playglock.exe, 00000002.00000003.1699593553.0000000002773000.00000004.00000020.00020000.00000000.sdmp, playglock.exe, 00000002.00000000.1698919361.0000000000638000.00000002.00000001.01000000.00000009.sdmp, playglock.exe.1.dr, is-HQ21L.tmp.1.dr, Edrax Smart Maker 9.28.43.exe.2.drfalse
                                            unknown
                                            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#is-GF0FM.tmp.1.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://subca.ocsp-certum.com01is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://www.openssl.org/His-GF0FM.tmp.1.drfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78Qplayglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://185.208.158.248/search/?q=67e28dd86d55f12playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.remobjects.com/psSecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686470686.00000000023F0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe, 00000000.00000003.1686645413.00000000021C8000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp, 00000001.00000000.1687458246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp.0.dr, is-AD0QP.tmp.1.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://185.208.158.248/search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e=playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://www.openssl.org/fis-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.certum.pl/CPS0is-RLF2N.tmp.1.dr, is-F9BNG.tmp.1.drfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://185.208.1playglock.exe, 00000002.00000002.2950078740.0000000000B10000.00000004.00000020.00020000.00000000.sdmp, playglock.exe, 00000002.00000002.2951184222.000000000339C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      185.208.158.248
                                                      ddbnoae.infoSwitzerland
                                                      34888SIMPLECARRER2ITtrue
                                                      195.154.173.35
                                                      unknownFrance
                                                      12876OnlineSASFRfalse
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1521409
                                                      Start date and time:2024-09-28 09:24:07 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 5m 31s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:7
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.evad.winEXE@5/26@1/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 92%
                                                      • Number of executed functions: 198
                                                      • Number of non-executed functions: 251
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • VT rate limit hit for: SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
                                                      TimeTypeDescription
                                                      03:25:35API Interceptor557527x Sleep call for process: playglock.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      185.208.158.248SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                                                        file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
                                                          file.exeGet hashmaliciousSocks5SystemzBrowse
                                                            boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                8b8h4p07ND.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  mfRfEQGtYF.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    oFzEHfD9N6.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      Wf6rwc9MMw.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        25g5vdifBs.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          195.154.173.35SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            EvKSsyJozV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              J2alzv5eSV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                CSBls4grBI.exeGet hashmaliciousLummaC, Socks5SystemzBrowse
                                                                                  CmpQ9KLAn2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                    MV1Jj4KF8c.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                      7Q957DAcIY.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                        DHCPY55Rnh.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                          ojwgPHqHSu.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                            9HpSQvf9Fp.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              No context
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              OnlineSASFRSecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 195.154.173.35
                                                                                              report_209.pdfGet hashmaliciousUnknownBrowse
                                                                                              • 62.210.196.157
                                                                                              g3V051umJf.htmlGet hashmaliciousUnknownBrowse
                                                                                              • 212.129.25.206
                                                                                              https://campaignjoinnow42.cloud/Get hashmaliciousUnknownBrowse
                                                                                              • 51.159.84.191
                                                                                              EvKSsyJozV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 195.154.173.35
                                                                                              J2alzv5eSV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 195.154.173.35
                                                                                              CSBls4grBI.exeGet hashmaliciousLummaC, Socks5SystemzBrowse
                                                                                              • 195.154.173.35
                                                                                              http://urlz.fr/r4kuGet hashmaliciousUnknownBrowse
                                                                                              • 212.83.160.162
                                                                                              CmpQ9KLAn2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 195.154.173.35
                                                                                              MV1Jj4KF8c.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 195.154.173.35
                                                                                              SIMPLECARRER2ITSecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 185.196.8.214
                                                                                              SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 185.196.8.214
                                                                                              SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 185.208.158.248
                                                                                              http://www.jp-area.com/beppu/rank.cgi?mode=link&id=218&url=https://0oenqK.startprogrammingnowbook.comGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 185.208.158.9
                                                                                              https://www.pineapplehospitality.net/Get hashmaliciousUnknownBrowse
                                                                                              • 185.208.159.111
                                                                                              file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
                                                                                              • 185.208.158.248
                                                                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 185.208.158.248
                                                                                              boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 185.208.158.248
                                                                                              http://0e0hshi.trafiklite.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                              • 185.208.158.9
                                                                                              file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                              • 185.208.158.248
                                                                                              No context
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              C:\Users\user\AppData\Local\Play Glock\Qt5OpenGL.dll (copy)SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                  SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                    file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
                                                                                                      file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                        boSodF2WmT.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, Socks5SystemzBrowse
                                                                                                            file.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                              8b8h4p07ND.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                EvKSsyJozV.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                                                  Process:C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2916352
                                                                                                                  Entropy (8bit):6.880539158757775
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:h7ewEBX5iWVPDO1qO8QSWXSBPM3atVmtXz5Erv:GBJjO1qO8Y2PMKDmtXz
                                                                                                                  MD5:31590895739E872769BF62DD513196B7
                                                                                                                  SHA1:1289298AE75B4E4CECB57CE3C9DF018241BE1148
                                                                                                                  SHA-256:3205C7A980AE89897423A788DB8BF2900A3311E4846C8D6A9946874400B65918
                                                                                                                  SHA-512:1F0D4E85158180F52E6F37FEE0BA7A46EFD4CCB487A6BC23D57C00C2A6CC0111B0B7F90CBA79C01B555E5AE43251984BAE73323586A58F093ABDF43833CB0712
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                  Reputation:low
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A.L.................."..........|"......."...@...........................,.....0.,.....................................L.".......#.($............................................................................".t............................text.....".......".................`....rdata..l5...."..@....".............@..@.data...xT... #..0... #.............@....rsrc....0....#..0...P#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  File Type:Non-ISO extended-ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):8
                                                                                                                  Entropy (8bit):2.0
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:rShl:cl
                                                                                                                  MD5:4852ECCD30144B33B04C74093F1224DC
                                                                                                                  SHA1:D4CD58D4A0FE6F4CF2C578AB83489B8FF6EA1FE1
                                                                                                                  SHA-256:0455D2DDA0715A9495FACCFFA90997A6898618ADF25498F30DF5518842655899
                                                                                                                  SHA-512:98B2A665D8EF0497EB01E93F2FFA501C2673DD844D1FFCE9A86B7363C8287D4B02BF70F67FFF96F5E44A818F8FB033A066FDF8C53B92C0FECFB67C96946CB195
                                                                                                                  Malicious:false
                                                                                                                  Reputation:low
                                                                                                                  Preview:...f....
                                                                                                                  Process:C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4
                                                                                                                  Entropy (8bit):0.8112781244591328
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:rln:x
                                                                                                                  MD5:AC8AAAEA2B609745C410ABC9C2FC3851
                                                                                                                  SHA1:52E1620DF4D296AF2BF31B954FE972DB03894A1C
                                                                                                                  SHA-256:A71962744B947463B61084E87B378F086EA8F9EE7178F55D12E7100CFA23F22D
                                                                                                                  SHA-512:7EF39F57B23B64E34C268BB1E9F336CD8B2FAADBC540B22E07714CF92DCF93A4ED790525BDE5095F69B6D105A7E928DDDFF64BBB60EBC865A75BA1622FAB12CE
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview:V...
                                                                                                                  Process:C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):128
                                                                                                                  Entropy (8bit):2.9545817380615236
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:SmwW3Fde9UUDrjStGs/:Smze7DPStGM
                                                                                                                  MD5:98DDA7FC0B3E548B68DE836D333D1539
                                                                                                                  SHA1:D0CB784FA2BBD3BDE2BA4400211C3B613638F1C6
                                                                                                                  SHA-256:870555CDCBA1F066D893554731AE99A21AE776D41BCB680CBD6510CB9F420E3D
                                                                                                                  SHA-512:E79BD8C2E0426DBEBA8AC2350DA66DC0413F79860611A05210905506FEF8B80A60BB7E76546B0CE9C6E6BC9DDD4BC66FF4C438548F26187EAAF6278F769B3AC1
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview:30ea4c433b26b5bea4193c311bc4a25098960f3df7dbf2a6175bf7d152ea71ca................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  File Type:ASCII text, with no line terminators
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):128
                                                                                                                  Entropy (8bit):1.7095628900165245
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:3:LDXdQSWBdMUE/:LLdQSGd
                                                                                                                  MD5:4FFFD4D2A32CBF8FB78D521B4CC06680
                                                                                                                  SHA1:3FA6EFA82F738740179A9388D8046619C7EBDF54
                                                                                                                  SHA-256:EC52F73A17E6AFCF78F3FD8DFC7177024FEB52F5AC2B602886788E4348D5FB68
                                                                                                                  SHA-512:130A074E6AD38EEE2FB088BED2FCB939BF316B0FCBB4F5455AB49C2685BEEDCB5011107A22A153E56BF5E54A45CA4801C56936E71899C99BA9A4F694A1D4CC6D
                                                                                                                  Malicious:false
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview:dad6f9fa0c8327344d1aa24f183c3767................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):334848
                                                                                                                  Entropy (8bit):6.5257884005400015
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
                                                                                                                  MD5:C1D465E061D7D02895DAEB19BDB28AC9
                                                                                                                  SHA1:5E729EE51DF080545C7031D771B85094A2B2D4E9
                                                                                                                  SHA-256:777917D30F277A9E88D8FC04E69B955A2B0BD3F2BCF2E36F7F9CFFEF2583EE60
                                                                                                                  SHA-512:438ADAA0AC3AD47621D288E3FF56493CC7DE4E2A89FC5420E246A6045DB79E7CB84A28D3F3420841340AB33BD632F12FDC3A4E9D8EF99601CA9F975B7F8309E1
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Joe Sandbox View:
                                                                                                                  • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.11072.7602.exe, Detection: malicious, Browse
                                                                                                                  • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.20199.21407.exe, Detection: malicious, Browse
                                                                                                                  • Filename: SecuriteInfo.com.Gen.Heur.Munp.1.15479.6612.exe, Detection: malicious, Browse
                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                  • Filename: boSodF2WmT.exe, Detection: malicious, Browse
                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                  • Filename: 8b8h4p07ND.exe, Detection: malicious, Browse
                                                                                                                  • Filename: EvKSsyJozV.exe, Detection: malicious, Browse
                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#................ ..............a.................................g........ ......................P..Z........j...p..8.......................d............................`......................@................................text...............................`.P`.data...............................@.0..rdata...s.......t..................@.p@.eh_framD....p.......<..............@.0@.bss....H....@........................p..edata..Z....P......................@.0@.idata...j.......l..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...8....p......................@.0..reloc..d........ ..................@.0B........................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):348160
                                                                                                                  Entropy (8bit):6.542655141037356
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):499712
                                                                                                                  Entropy (8bit):6.414789978441117
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):334848
                                                                                                                  Entropy (8bit):6.5257884005400015
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:JmuFcP82IqE5RSbvQpYVgMW2i32blpDW2pmoZ1:JmuFc02IqE7SbLVgR1O
                                                                                                                  MD5:C1D465E061D7D02895DAEB19BDB28AC9
                                                                                                                  SHA1:5E729EE51DF080545C7031D771B85094A2B2D4E9
                                                                                                                  SHA-256:777917D30F277A9E88D8FC04E69B955A2B0BD3F2BCF2E36F7F9CFFEF2583EE60
                                                                                                                  SHA-512:438ADAA0AC3AD47621D288E3FF56493CC7DE4E2A89FC5420E246A6045DB79E7CB84A28D3F3420841340AB33BD632F12FDC3A4E9D8EF99601CA9F975B7F8309E1
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..................#................ ..............a.................................g........ ......................P..Z........j...p..8.......................d............................`......................@................................text...............................`.P`.data...............................@.0..rdata...s.......t..................@.p@.eh_framD....p.......<..............@.0@.bss....H....@........................p..edata..Z....P......................@.0@.idata...j.......l..................@.0..CRT....,....P......................@.0..tls.... ....`......................@.0..rsrc...8....p......................@.0..reloc..d........ ..................@.0B........................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):392048
                                                                                                                  Entropy (8bit):6.542831007177094
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                                                                                  MD5:EE856A00410ECED8CC609936D01F954E
                                                                                                                  SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                                                                                  SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                                                                                  SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):719720
                                                                                                                  Entropy (8bit):6.620042925263483
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                                                                                  MD5:20B6B06BBD211A8ACFE51193653E4167
                                                                                                                  SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                                                                                  SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                                                                                  SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:data
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2916352
                                                                                                                  Entropy (8bit):6.880538788620891
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:C7ewEBX5iWVPDO1qO8QSWXSBPM3atVmtXz5Erv:FBJjO1qO8Y2PMKDmtXz
                                                                                                                  MD5:02954F8A8FAC39F93D97ECB5C850AD4E
                                                                                                                  SHA1:327EF5C35F5B13A936B4E46E5225226F38744C41
                                                                                                                  SHA-256:C6ABE012BA40C6D2A2083C6D1C28B23599E8D4E9DE1414958A710604D00B7B89
                                                                                                                  SHA-512:D992233443F3B6871E70DD7E59FDFAC3766C5C85234E392BE2F2DBC48BAC7FF3FABA7E12D0A9622455118ADAC3C75C172CF04992B86D692FD333AE2CA42C14C5
                                                                                                                  Malicious:false
                                                                                                                  Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A.L.................."..........|"......."...@...........................,.....0.,.....................................L.".......#.($............................................................................".t............................text.....".......".................`....rdata..l5...."..@....".............@..@.data...xT... #..0... #.............@....rsrc....0....#..0...P#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1471856
                                                                                                                  Entropy (8bit):6.8308189184145665
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                                                                                  MD5:A236287C42F921D109475D47E9DCAC2B
                                                                                                                  SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                                                                                  SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                                                                                  SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):1471856
                                                                                                                  Entropy (8bit):6.8308189184145665
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24576:6PQ+KpPa3kPjWWJy+0PX7PM6ZB9In8QmMMWwI6/I+no9R2aFVWKZxPo89/xc3lRc:brWW0jnMVpUBuwemQnGP8RqYr1mpbk3
                                                                                                                  MD5:A236287C42F921D109475D47E9DCAC2B
                                                                                                                  SHA1:6D7C177A0AC3076383669BCE46608EB4B6B787EC
                                                                                                                  SHA-256:63AA600A7C914C2D59280069169CC93E750E42C9A1146E238C9128E073D578FD
                                                                                                                  SHA-512:C325B12235AD77937E3799F1406EB6AA3BC5479BFDFF0EA2F2178FE243E63689AC37BB539ADCBB326B0DE6C09B884771AD57F59184A5B69065682855382ADD8A
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ ...A.W.A.W.A.W.%.V.A.W.%.VeA.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.%.V.A.W.A.WUA.W.A.W.A.W2%.V.C.W2%.V.A.W2%.W.A.W2%.V.A.WRich.A.W................PE..L.....r^...........!.....v...............................................................@..........................r......H*..x.......X............B..p3..........@e..............................`e..@............................................text....u.......v.................. ..`.rdata..............z..............@..@.data........@...j... ..............@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):719720
                                                                                                                  Entropy (8bit):6.620042925263483
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:ST+z0ucMr64M+yiwUqfWY/EThHzgOXfpwN9Cu66vLHL1e13XYFU8HtUDsMBPxtFe:FPAeKLL1e6kpqsookesEiU1xJycD4R1z
                                                                                                                  MD5:20B6B06BBD211A8ACFE51193653E4167
                                                                                                                  SHA1:817D442B46DD6F35FD9641E0C7262C934ED76848
                                                                                                                  SHA-256:7A16E6ED0C0A49AEB8EA4972600A7A1422C92550602A150634B1C221F79300B4
                                                                                                                  SHA-512:0F0C31D46E7274F28F62AFBBB4A172CB088AF40F6C71A56297B08D83D16548C0A4FDA4CF5F4A29C1445EEDF15FE81FC405E2EB8680F92C744406D031A05A72C8
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+X?|o9Q/o9Q/o9Q/{RR.e9Q/{RT..9Q/{RU.}9Q/{RP.m9Q/=QT.r9Q/=QU.`9Q/=QR.z9Q/.PP.l9Q/o9P/j;Q/.PU.C9Q/.PQ.n9Q/.P./n9Q/.PS.n9Q/Richo9Q/................PE..L...3..c...........!.....d...~......Z........................................ .......9....@.............................4@...)..<.......................h).......S..@...T...............................@............................................text...Lb.......d.................. ..`.rdata...............h..............@..@.data...`I...`...6...D..............@....rsrc................z..............@..@.reloc...S.......T...~..............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):499712
                                                                                                                  Entropy (8bit):6.414789978441117
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):348160
                                                                                                                  Entropy (8bit):6.542655141037356
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:modified
                                                                                                                  Size (bytes):2916352
                                                                                                                  Entropy (8bit):6.880539158757775
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:49152:h7ewEBX5iWVPDO1qO8QSWXSBPM3atVmtXz5Erv:GBJjO1qO8Y2PMKDmtXz
                                                                                                                  MD5:31590895739E872769BF62DD513196B7
                                                                                                                  SHA1:1289298AE75B4E4CECB57CE3C9DF018241BE1148
                                                                                                                  SHA-256:3205C7A980AE89897423A788DB8BF2900A3311E4846C8D6A9946874400B65918
                                                                                                                  SHA-512:1F0D4E85158180F52E6F37FEE0BA7A46EFD4CCB487A6BC23D57C00C2A6CC0111B0B7F90CBA79C01B555E5AE43251984BAE73323586A58F093ABDF43833CB0712
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A.L.................."..........|"......."...@...........................,.....0.,.....................................L.".......#.($............................................................................".t............................text.....".......".................`....rdata..l5...."..@....".............@..@.data...xT... #..0... #.............@....rsrc....0....#..0...P#.............@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):392048
                                                                                                                  Entropy (8bit):6.542831007177094
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:6144:1eIwnft+S34NVSTjMFR+oVbKQfbno1/1oz6i2EDSD4I+XdtQXGMiFcoOjAWcIhbl:1eIwnft+S34NVSTQD+oVbKQfrC/1ct25
                                                                                                                  MD5:EE856A00410ECED8CC609936D01F954E
                                                                                                                  SHA1:705D378626AEC86FECFDF04C86244006BC3AF431
                                                                                                                  SHA-256:B6192300D3C1476EF3C25A368D055AA401035E78F9F6DBE5F93C84D36EF1FA62
                                                                                                                  SHA-512:666D731247DAEAE4B57925DFA8CAE845327FD34E0F6B9AAD1BCF471D1800D7E8AF5642A5FB6E0EC58BA3AC7DD98A6D3FE0B473F34C16FFB9985621C98C0463EF
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../.v[N.%[N.%[N.%4*.$QN.%4*.$.N.%4*.$IN.%4*.$YN.%.*.$HN.%.*.$GN.%.*.$KN.%.*.$XN.%[N.%.O.%.*.$iN.%.*.$ZN.%.*e%ZN.%.*.$ZN.%Rich[N.%........PE..L...D.r^...........!.....8..........^7.......P......................................'.....@..........................6..<)..L_..<.......X...............p3.......3..@,..............................`,..@............P...............................text....7.......8.................. ..`.rdata..l....P.......<..............@..@.data....?...p...6...X..............@....rsrc...X...........................@..@.reloc...3.......4..................@..B................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):720033
                                                                                                                  Entropy (8bit):6.522470355445484
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:sQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidb/gUHayxyFT:sQPh1eLSSKrPD37zzH2A6QD/srqggEBj
                                                                                                                  MD5:BBB796D31DB8621A757501294FD8A626
                                                                                                                  SHA1:0BDB1E67BAA8A569D8FED524B8737F522CAE5357
                                                                                                                  SHA-256:D8D0E912DE7CFED34DDD8EB282C9EF674F746109FC0C8C603884AF7B01638801
                                                                                                                  SHA-512:613C1CECC83C196E91BC21C0475EC2B5F5B55804DFAD9D188B50A230CFD3FD68A09AF94C5C42A1579CA6BACFA101254319E9E48BD23A001515B676FD47D34E43
                                                                                                                  Malicious:true
                                                                                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:InnoSetup Log Play Glock, version 0x30, 4401 bytes, 549163\user, "C:\Users\user\AppData\Local\Play Glock"
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):4401
                                                                                                                  Entropy (8bit):4.5787073185352565
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:3k8M8Wjjv88QpL0GU9vX+eOIhAxx4cVSQs0LixNI98sui:FM8Wjb87pL0zuHIhAwcVSQ1sNIlr
                                                                                                                  MD5:4A52560C14B3883487F7C5AE770C1438
                                                                                                                  SHA1:A24E083AD29AAE36D3F787085F8130F67282FAA1
                                                                                                                  SHA-256:1FDFE68791335CB18AF5CC14EB62BC05406BF48B573DB4AC085C44DBC52E1171
                                                                                                                  SHA-512:E0A45A1924A5E12F22616D9A10266C06554F42DCD8126274B5BED30FAAA5339EC41F023DE21A05984576020DAB9DEFE44C34B2867AEC86B7CB0280CE3C4E2861
                                                                                                                  Malicious:false
                                                                                                                  Preview:Inno Setup Uninstall Log (b)....................................Play Glock......................................................................................................................Play Glock......................................................................................................................0.......1...%...............................................................................................................J..e.......m.'.......G....549163.user'C:\Users\user\AppData\Local\Play Glock.................. .....R......IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%...dll:User32.dll.GetS
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):720033
                                                                                                                  Entropy (8bit):6.522470355445484
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:sQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidb/gUHayxyFT:sQPh1eLSSKrPD37zzH2A6QD/srqggEBj
                                                                                                                  MD5:BBB796D31DB8621A757501294FD8A626
                                                                                                                  SHA1:0BDB1E67BAA8A569D8FED524B8737F522CAE5357
                                                                                                                  SHA-256:D8D0E912DE7CFED34DDD8EB282C9EF674F746109FC0C8C603884AF7B01638801
                                                                                                                  SHA-512:613C1CECC83C196E91BC21C0475EC2B5F5B55804DFAD9D188B50A230CFD3FD68A09AF94C5C42A1579CA6BACFA101254319E9E48BD23A001515B676FD47D34E43
                                                                                                                  Malicious:true
                                                                                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                                                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
                                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):708608
                                                                                                                  Entropy (8bit):6.5141637560670596
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:12288:UQCCh1TaLSSKrPD37zzH2A6QGgx/nstpq9KgER19zrNidb/gUHayxyF:UQPh1eLSSKrPD37zzH2A6QD/srqggEBX
                                                                                                                  MD5:5D678A5E268C0BAD90CD1584C53048AD
                                                                                                                  SHA1:41B792ED7DE224D3C2D7121C63BA1B585EBC996D
                                                                                                                  SHA-256:9E96DFF6633087E74AF0CED02E8F6E0848323335685618751A218F5486F516B2
                                                                                                                  SHA-512:C1F3AF1B7A2E73D1991E8A13C0141BF26F4EABD9A96E69E5EA937CD3BCF0B0B01658DF05E70FFB94645008CC58B2A21D3258E3A13DD87B4BAEF85269902FBA46
                                                                                                                  Malicious:true
                                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@...............................%........................................................... ......................................................CODE............................... ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata....... ......................@..P.reloc..H....0......................@..P.rsrc...............................@..P.....................\..............@..P........................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):2560
                                                                                                                  Entropy (8bit):2.8818118453929262
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                                                  MD5:A69559718AB506675E907FE49DEB71E9
                                                                                                                  SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                                                  SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                                                  SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                                                  Malicious:true
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):6144
                                                                                                                  Entropy (8bit):4.720366600008286
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                                                                  MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                                                                  SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                                                                  SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                                                                  SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                  Category:dropped
                                                                                                                  Size (bytes):23312
                                                                                                                  Entropy (8bit):4.596242908851566
                                                                                                                  Encrypted:false
                                                                                                                  SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                                                  MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                                                  SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                                                  SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                                                  SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                                                  Malicious:false
                                                                                                                  Antivirus:
                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                  Entropy (8bit):7.997455626000112
                                                                                                                  TrID:
                                                                                                                  • Win32 Executable (generic) a (10002005/4) 98.73%
                                                                                                                  • Inno Setup installer (109748/4) 1.08%
                                                                                                                  • Windows Screen Saver (13104/52) 0.13%
                                                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                  File name:SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
                                                                                                                  File size:3'208'313 bytes
                                                                                                                  MD5:4e277b4187525cd19cd7269a4daf9fc1
                                                                                                                  SHA1:611a0b0711f3850958422680b9b662466e7e800a
                                                                                                                  SHA256:733ad8a06b4d21a85c29b76af4a89b22077292903fc3df7eb052d4f2027af99f
                                                                                                                  SHA512:c3f753dbdcc7c3d3caadcf04a76a07428d8d6d533463fe1088b0b9f69a6a31290f4f5bd4c4b2f2a59977fe4a89ade9323dd03ee7021031caae7def589b94ab03
                                                                                                                  SSDEEP:98304:4a+WKrcMY3T+6xIs/GKV01lD3AjWk3yAD:porcNS6aZd3AH/D
                                                                                                                  TLSH:06E5338246A7ADB7E860DE7C29059E7C8BF75E64683F000131E9284D575F3C824ED767
                                                                                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                                  Icon Hash:2d2e3797b32b2b99
                                                                                                                  Entrypoint:0x40a5f8
                                                                                                                  Entrypoint Section:CODE
                                                                                                                  Digitally signed:false
                                                                                                                  Imagebase:0x400000
                                                                                                                  Subsystem:windows gui
                                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                                                  TLS Callbacks:
                                                                                                                  CLR (.Net) Version:
                                                                                                                  OS Version Major:1
                                                                                                                  OS Version Minor:0
                                                                                                                  File Version Major:1
                                                                                                                  File Version Minor:0
                                                                                                                  Subsystem Version Major:1
                                                                                                                  Subsystem Version Minor:0
                                                                                                                  Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                                                  Instruction
                                                                                                                  push ebp
                                                                                                                  mov ebp, esp
                                                                                                                  add esp, FFFFFFC4h
                                                                                                                  push ebx
                                                                                                                  push esi
                                                                                                                  push edi
                                                                                                                  xor eax, eax
                                                                                                                  mov dword ptr [ebp-10h], eax
                                                                                                                  mov dword ptr [ebp-24h], eax
                                                                                                                  call 00007F43D46080D3h
                                                                                                                  call 00007F43D46092DAh
                                                                                                                  call 00007F43D4609569h
                                                                                                                  call 00007F43D460960Ch
                                                                                                                  call 00007F43D460B5ABh
                                                                                                                  call 00007F43D460DF16h
                                                                                                                  call 00007F43D460E07Dh
                                                                                                                  xor eax, eax
                                                                                                                  push ebp
                                                                                                                  push 0040ACC9h
                                                                                                                  push dword ptr fs:[eax]
                                                                                                                  mov dword ptr fs:[eax], esp
                                                                                                                  xor edx, edx
                                                                                                                  push ebp
                                                                                                                  push 0040AC92h
                                                                                                                  push dword ptr fs:[edx]
                                                                                                                  mov dword ptr fs:[edx], esp
                                                                                                                  mov eax, dword ptr [0040C014h]
                                                                                                                  call 00007F43D460EB2Bh
                                                                                                                  call 00007F43D460E716h
                                                                                                                  cmp byte ptr [0040B234h], 00000000h
                                                                                                                  je 00007F43D460F60Eh
                                                                                                                  call 00007F43D460EC28h
                                                                                                                  xor eax, eax
                                                                                                                  call 00007F43D4608DC9h
                                                                                                                  lea edx, dword ptr [ebp-10h]
                                                                                                                  xor eax, eax
                                                                                                                  call 00007F43D460BBBBh
                                                                                                                  mov edx, dword ptr [ebp-10h]
                                                                                                                  mov eax, 0040CE2Ch
                                                                                                                  call 00007F43D460816Ah
                                                                                                                  push 00000002h
                                                                                                                  push 00000000h
                                                                                                                  push 00000001h
                                                                                                                  mov ecx, dword ptr [0040CE2Ch]
                                                                                                                  mov dl, 01h
                                                                                                                  mov eax, 0040738Ch
                                                                                                                  call 00007F43D460C44Ah
                                                                                                                  mov dword ptr [0040CE30h], eax
                                                                                                                  xor edx, edx
                                                                                                                  push ebp
                                                                                                                  push 0040AC4Ah
                                                                                                                  push dword ptr fs:[edx]
                                                                                                                  mov dword ptr fs:[edx], esp
                                                                                                                  call 00007F43D460EB86h
                                                                                                                  mov dword ptr [0040CE38h], eax
                                                                                                                  mov eax, dword ptr [0040CE38h]
                                                                                                                  cmp dword ptr [eax+0Ch], 00000000h
                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                  CODE0x10000x9d300x9e0004ffdb46e50716ec8cb7db42819802fdFalse0.6052956882911392data6.631603395825714IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                  DATA0xb0000x2500x400beee52f18301950f82460d9ffe5aec7eFalse0.306640625data2.7547169534996403IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  BSS0xc0000xe900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                  .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                                  .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                                  .rsrc0x110000x2c000x2c0001303b7659440a457f51baa61baa5400False0.3332741477272727data4.591625228547384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                  RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                                                  RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                                                  RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                                                  RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                                                  RT_STRING0x125740x2f2data0.35543766578249336
                                                                                                                  RT_STRING0x128680x30cdata0.3871794871794872
                                                                                                                  RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                                                  RT_STRING0x12e440x68data0.75
                                                                                                                  RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                                                  RT_STRING0x12f600xaedata0.5344827586206896
                                                                                                                  RT_RCDATA0x130100x2cdata1.2045454545454546
                                                                                                                  RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                                                  RT_VERSION0x1307c0x4f4dataEnglishUnited States0.27996845425867506
                                                                                                                  RT_MANIFEST0x135700x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                                                                                  DLLImport
                                                                                                                  kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                                                  user32.dllMessageBoxA
                                                                                                                  oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                                                  kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                                                  user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                                                  comctl32.dllInitCommonControls
                                                                                                                  advapi32.dllAdjustTokenPrivileges
                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                  DutchNetherlands
                                                                                                                  EnglishUnited States
                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                  2024-09-28T09:25:55.540626+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463624185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:55.540626+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463624185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:58.427061+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463624185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:58.427061+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463624185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:58.781783+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463624185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:58.781783+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463624185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:59.624548+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463628185.208.158.24880TCP
                                                                                                                  2024-09-28T09:25:59.624548+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463628185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:00.434553+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463629185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:00.434553+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463629185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:01.281941+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463630185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:01.281941+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463630185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:02.092723+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463631185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:02.092723+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463631185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:03.049963+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463632185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:03.049963+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463632185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:03.410859+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463632185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:03.410859+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463632185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:04.247928+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463633185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:04.247928+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463633185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:05.051376+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463634185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:05.051376+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463634185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:05.402850+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463634185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:05.402850+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463634185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:06.221287+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463635185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:06.221287+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463635185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:06.572307+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463635185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:06.572307+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463635185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:07.388696+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463636185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:07.388696+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463636185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:08.221257+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463637185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:08.221257+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463637185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:08.860198+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463637185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:08.860198+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463637185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:09.679607+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463638185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:09.679607+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463638185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:10.500217+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463639185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:10.500217+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463639185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:11.308851+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463640185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:11.308851+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463640185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:12.376602+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463641185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:12.376602+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463641185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:13.237350+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463642185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:13.237350+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463642185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:13.584649+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463642185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:13.584649+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463642185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:13.930705+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463642185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:13.930705+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463642185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:14.767368+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463643185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:14.767368+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463643185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:16.652444+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463644185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:16.652444+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463644185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:17.730814+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463645185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:17.730814+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463645185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:18.544748+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463646185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:18.544748+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463646185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:19.350971+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:19.350971+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:19.693692+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:19.693692+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:20.039696+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:20.039696+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:20.680848+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:20.680848+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463647185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:21.509099+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463648185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:21.509099+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463648185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:22.322391+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463649185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:22.322391+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463649185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:23.835727+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463650185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:23.835727+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463650185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:24.188683+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463650185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:24.188683+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463650185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:24.988129+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463651185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:24.988129+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463651185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:26.310503+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463651185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:26.310503+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463651185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:27.125276+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463652185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:27.125276+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463652185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:27.948092+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463653185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:27.948092+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463653185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:28.766691+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463654185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:28.766691+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463654185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:29.576544+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463655185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:29.576544+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463655185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:30.401804+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463656185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:30.401804+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463656185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:31.246416+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463657185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:31.246416+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463657185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:32.056708+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463658185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:32.056708+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463658185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:32.872983+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463659185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:32.872983+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463659185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:33.718827+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463660185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:33.718827+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463660185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:34.540230+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463661185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:34.540230+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463661185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:35.370223+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463662185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:35.370223+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463662185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:36.204093+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463663185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:36.204093+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463663185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:36.562402+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463663185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:36.562402+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463663185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:37.374139+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463664185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:37.374139+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463664185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:38.186075+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463665185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:38.186075+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463665185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:39.010930+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463666185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:39.010930+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463666185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:39.872727+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463667185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:39.872727+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463667185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:40.723914+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463668185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:40.723914+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463668185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:41.075276+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463668185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:41.075276+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463668185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:42.127712+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463669185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:42.127712+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463669185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:42.487985+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463669185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:42.487985+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463669185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:43.334326+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463670185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:43.334326+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463670185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:43.688516+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463670185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:43.688516+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463670185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:44.608533+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463671185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:44.608533+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463671185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:45.465389+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463672185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:45.465389+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463672185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:46.295276+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463673185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:46.295276+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463673185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:47.122375+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463674185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:47.122375+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463674185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:48.188351+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463675185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:48.188351+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463675185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:49.027064+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463676185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:49.027064+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463676185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:49.842755+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463677185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:49.842755+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463677185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:50.662820+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463678185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:50.662820+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463678185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:51.645002+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463679185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:51.645002+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463679185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:52.464837+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463680185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:52.464837+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463680185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:53.290624+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463681185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:53.290624+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463681185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:54.126585+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463682185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:54.126585+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463682185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:54.938947+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463683185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:54.938947+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463683185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:55.744507+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463684185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:55.744507+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463684185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:56.589229+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463685185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:56.589229+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463685185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:57.424641+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463686185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:57.424641+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463686185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:58.286158+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463687185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:58.286158+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463687185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:59.236495+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463688185.208.158.24880TCP
                                                                                                                  2024-09-28T09:26:59.236495+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463688185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:00.067537+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463689185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:00.067537+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463689185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:00.898430+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463690185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:00.898430+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463690185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:01.718700+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463691185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:01.718700+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463691185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:02.693859+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463692185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:02.693859+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463692185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:03.700537+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463693185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:03.700537+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463693185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:04.554380+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463694185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:04.554380+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463694185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:05.459809+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463695185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:05.459809+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463695185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:06.288510+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463696185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:06.288510+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463696185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:07.125952+02002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.463697185.208.158.24880TCP
                                                                                                                  2024-09-28T09:27:07.125952+02002050112ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.463697185.208.158.24880TCP
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Sep 28, 2024 09:25:54.807113886 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:54.830723047 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:54.830818892 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:54.833246946 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:54.844866037 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:55.540431023 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:55.540626049 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:55.542112112 CEST636252023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:55.549005985 CEST202363625195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:55.549092054 CEST636252023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:55.549189091 CEST636252023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:55.554929972 CEST202363625195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:55.555005074 CEST636252023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:55.559957027 CEST202363625195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:56.172540903 CEST202363625195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:56.220906019 CEST636252023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:58.178066015 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.183151960 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.426983118 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.427061081 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.537240982 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.542357922 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.781683922 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.781783104 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.782772064 CEST636272023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:58.789731026 CEST202363627195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.789834023 CEST636272023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:58.790014029 CEST636272023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:58.790071011 CEST636272023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:58.796535969 CEST202363627195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.838099957 CEST202363627195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.896641016 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.897022963 CEST6362880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.902869940 CEST8063628185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.902961969 CEST6362880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.903218031 CEST6362880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.903417110 CEST8063624185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:58.903472900 CEST6362480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:58.909080029 CEST8063628185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:59.251296043 CEST202363627195.154.173.35192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:59.251377106 CEST636272023192.168.2.4195.154.173.35
                                                                                                                  Sep 28, 2024 09:25:59.621717930 CEST8063628185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:59.624547958 CEST6362880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:59.741966963 CEST6362880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:59.742340088 CEST6362980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:59.747195005 CEST8063628185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:59.747260094 CEST8063629185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:59.747345924 CEST6362880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:59.747452021 CEST6362980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:59.747534990 CEST6362980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:25:59.752302885 CEST8063629185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:00.434387922 CEST8063629185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:00.434552908 CEST6362980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:00.586000919 CEST6362980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:00.586369991 CEST6363080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:00.591308117 CEST8063629185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:00.591449022 CEST6362980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:00.591449976 CEST8063630185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:00.591532946 CEST6363080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:00.591706038 CEST6363080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:00.596518993 CEST8063630185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:01.281862020 CEST8063630185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:01.281940937 CEST6363080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:01.398354053 CEST6363080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:01.398752928 CEST6363180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:01.406558037 CEST8063630185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:01.406636953 CEST8063631185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:01.406665087 CEST6363080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:01.406728983 CEST6363180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:01.406928062 CEST6363180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:01.414361000 CEST8063631185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:02.092626095 CEST8063631185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:02.092722893 CEST6363180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:02.210676908 CEST6363180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:02.211050034 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:02.215780020 CEST8063631185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:02.215878963 CEST6363180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:02.215915918 CEST8063632185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:02.216001034 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:02.216139078 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:02.221100092 CEST8063632185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:03.049871922 CEST8063632185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:03.049962997 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.163912058 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.168863058 CEST8063632185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:03.410763979 CEST8063632185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:03.410859108 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.533204079 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.533664942 CEST6363380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.538429022 CEST8063632185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:03.538575888 CEST8063633185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:03.538625956 CEST6363280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.538693905 CEST6363380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.538916111 CEST6363380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:03.543739080 CEST8063633185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:04.247778893 CEST8063633185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:04.247927904 CEST6363380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:04.364778996 CEST6363380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:04.365101099 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:04.370318890 CEST8063633185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:04.370356083 CEST8063634185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:04.370393038 CEST6363380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:04.370472908 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:04.370587111 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:04.375405073 CEST8063634185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:05.051310062 CEST8063634185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:05.051376104 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.161781073 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.166645050 CEST8063634185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:05.402781010 CEST8063634185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:05.402849913 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.521364927 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.521686077 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.526587963 CEST8063635185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:05.526679039 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.526704073 CEST8063634185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:05.526761055 CEST6363480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.526822090 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:05.531610012 CEST8063635185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:06.221194983 CEST8063635185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:06.221287012 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.334950924 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.339884043 CEST8063635185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:06.572079897 CEST8063635185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:06.572307110 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.695729971 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.696863890 CEST6363680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.700993061 CEST8063635185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:06.701065063 CEST6363580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.701756001 CEST8063636185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:06.701833963 CEST6363680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.701957941 CEST6363680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:06.706702948 CEST8063636185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:07.388587952 CEST8063636185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:07.388695955 CEST6363680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:07.515300989 CEST6363680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:07.515693903 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:07.521809101 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:07.521976948 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:07.522044897 CEST8063636185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:07.522104025 CEST6363680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:07.522203922 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:07.527014017 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.221177101 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.221256971 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.333986998 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.338989973 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.860011101 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.860198021 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.860333920 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.860393047 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.981687069 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.981961012 CEST6363880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.986829042 CEST8063638185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.986917973 CEST6363880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.986985922 CEST8063637185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:08.987015963 CEST6363880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.987056017 CEST6363780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:08.991908073 CEST8063638185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:09.679363966 CEST8063638185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:09.679606915 CEST6363880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:09.804440022 CEST6363880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:09.804765940 CEST6363980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:09.809662104 CEST8063639185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:09.809773922 CEST6363980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:09.809789896 CEST8063638185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:09.809864044 CEST6363880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:09.809988022 CEST6363980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:09.814848900 CEST8063639185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:10.499979973 CEST8063639185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:10.500216961 CEST6363980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:10.615422010 CEST6363980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:10.615832090 CEST6364080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:10.621167898 CEST8063639185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:10.621259928 CEST6363980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:10.621288061 CEST8063640185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:10.621356010 CEST6364080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:10.621484041 CEST6364080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:10.627212048 CEST8063640185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:11.308670998 CEST8063640185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:11.308851004 CEST6364080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:11.427438021 CEST6364080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:11.427634001 CEST6364180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:11.682426929 CEST8063641185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:11.682686090 CEST6364180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:11.682785034 CEST6364180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:11.683104992 CEST8063640185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:11.683304071 CEST6364080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:11.687628984 CEST8063641185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:12.376364946 CEST8063641185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:12.376601934 CEST6364180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:12.540712118 CEST6364180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:12.544058084 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:12.546111107 CEST8063641185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:12.546180010 CEST6364180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:12.548980951 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:12.549063921 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:12.551276922 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:12.559050083 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:13.237262011 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:13.237349987 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:13.349365950 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:13.354201078 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:13.584573030 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:13.584649086 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:13.693576097 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:13.698456049 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:13.929151058 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:13.930705070 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.052764893 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.053127050 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.058954954 CEST8063642185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:14.059581995 CEST8063643185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:14.059787035 CEST6364280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.059828997 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.059978962 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.067560911 CEST8063643185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:14.767263889 CEST8063643185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:14.767368078 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.880985022 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:14.881311893 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.189697981 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.799134970 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.877202034 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.932171106 CEST8063644185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:15.932221889 CEST8063643185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:15.932250023 CEST8063643185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:15.932284117 CEST8063644185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:15.932403088 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.932621002 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.933384895 CEST8063643185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:15.933470011 CEST6364380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:15.937542915 CEST8063644185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:16.652307034 CEST8063644185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:16.652443886 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:16.771190882 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:16.771506071 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:16.776490927 CEST8063645185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:16.776573896 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:16.776658058 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:16.776809931 CEST8063644185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:16.776876926 CEST6364480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:16.781716108 CEST8063645185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:17.730667114 CEST8063645185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:17.730720997 CEST8063645185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:17.730813980 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.730892897 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.853387117 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.853602886 CEST6364680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.858447075 CEST8063646185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:17.858540058 CEST6364680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.858692884 CEST8063645185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:17.858730078 CEST6364680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.858755112 CEST6364580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:17.863535881 CEST8063646185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:18.544666052 CEST8063646185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:18.544748068 CEST6364680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:18.661870003 CEST6364680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:18.662508011 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:18.667368889 CEST8063646185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:18.667449951 CEST6364680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:18.667505026 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:18.667592049 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:18.667742014 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:18.672656059 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:19.350874901 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:19.350970984 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:19.458714962 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:19.463727951 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:19.693502903 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:19.693691969 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:19.804538965 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:19.809629917 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:20.039589882 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:20.039695978 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.146485090 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.439069986 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:20.680558920 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:20.680847883 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.811207056 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.811441898 CEST6364880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.816252947 CEST8063648185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:20.816343069 CEST6364880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.816446066 CEST6364880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.816461086 CEST8063647185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:20.816525936 CEST6364780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:20.821305037 CEST8063648185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:21.508894920 CEST8063648185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:21.509099007 CEST6364880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:21.630554914 CEST6364880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:21.630783081 CEST6364980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:21.635750055 CEST8063649185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:21.635862112 CEST6364980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:21.635915041 CEST8063648185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:21.636303902 CEST6364880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:21.636413097 CEST6364980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:21.641227961 CEST8063649185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:22.322309017 CEST8063649185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:22.322391033 CEST6364980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:22.443240881 CEST6364980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:22.443497896 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:22.448509932 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:22.448616028 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:22.448652029 CEST8063649185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:22.448715925 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:22.448717117 CEST6364980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:22.453509092 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:23.835563898 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:23.835656881 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:23.835690975 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:23.835726976 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:23.835762978 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:23.945981979 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:23.950890064 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:24.188489914 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:24.188683033 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:24.302366018 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:24.302665949 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:24.307775974 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:24.307879925 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:24.307971954 CEST8063650185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:24.308002949 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:24.308044910 CEST6365080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:24.312872887 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:24.988037109 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:24.988128901 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:25.099764109 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:25.408510923 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.017880917 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.076152086 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:26.076189995 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:26.076225042 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:26.310414076 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:26.310503006 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.427323103 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.427639008 CEST6365280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.432554960 CEST8063651185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:26.432606936 CEST8063652185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:26.432642937 CEST6365180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.432684898 CEST6365280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.432795048 CEST6365280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:26.437592983 CEST8063652185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:27.125190020 CEST8063652185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:27.125276089 CEST6365280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:27.240015984 CEST6365280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:27.240355968 CEST6365380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:27.245310068 CEST8063652185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:27.245347977 CEST8063653185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:27.245381117 CEST6365280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:27.245438099 CEST6365380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:27.245536089 CEST6365380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:27.250475883 CEST8063653185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:27.947992086 CEST8063653185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:27.948091984 CEST6365380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.068356991 CEST6365380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.068686008 CEST6365480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.075268984 CEST8063654185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:28.075309038 CEST8063653185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:28.075406075 CEST6365480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.075406075 CEST6365380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.075476885 CEST6365480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.083204985 CEST8063654185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:28.766494989 CEST8063654185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:28.766690969 CEST6365480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.880585909 CEST6365480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.880888939 CEST6365580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.885782003 CEST8063655185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:28.885867119 CEST6365580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.885884047 CEST8063654185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:28.885952950 CEST6365480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.886018038 CEST6365580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:28.890791893 CEST8063655185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:29.576410055 CEST8063655185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:29.576544046 CEST6365580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:29.693766117 CEST6365580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:29.694128036 CEST6365680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:29.699131966 CEST8063655185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:29.699187040 CEST8063656185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:29.699213028 CEST6365580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:29.699269056 CEST6365680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:29.699425936 CEST6365680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:29.704216957 CEST8063656185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:30.401570082 CEST8063656185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:30.401803970 CEST6365680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:30.521393061 CEST6365680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:30.521663904 CEST6365780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:30.526921034 CEST8063657185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:30.526954889 CEST8063656185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:30.527007103 CEST6365780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:30.527036905 CEST6365680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:30.527215958 CEST6365780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:30.532130957 CEST8063657185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:31.246319056 CEST8063657185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:31.246416092 CEST6365780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:31.370017052 CEST6365780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:31.370348930 CEST6365880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:31.375261068 CEST8063658185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:31.375359058 CEST6365880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:31.375456095 CEST6365880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:31.375792980 CEST8063657185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:31.375860929 CEST6365780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:31.380446911 CEST8063658185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.056621075 CEST8063658185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.056708097 CEST6365880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.179413080 CEST6365880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.179725885 CEST6365980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.184587955 CEST8063658185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.184648037 CEST8063659185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.184669971 CEST6365880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.184725046 CEST6365980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.184907913 CEST6365980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.189776897 CEST8063659185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.872776985 CEST8063659185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.872982979 CEST6365980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.991569042 CEST6365980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.991863012 CEST6366080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:32.999862909 CEST8063660185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:32.999960899 CEST6366080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.000049114 CEST6366080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.007348061 CEST8063659185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:33.007421970 CEST6365980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.007725954 CEST8063660185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:33.717663050 CEST8063660185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:33.718827009 CEST6366080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.833812952 CEST6366080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.834139109 CEST6366180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.839623928 CEST8063661185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:33.840066910 CEST8063660185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:33.840173960 CEST6366080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.840186119 CEST6366180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.840281010 CEST6366180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:33.846786022 CEST8063661185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:34.540162086 CEST8063661185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:34.540230036 CEST6366180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:34.661968946 CEST6366180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:34.662254095 CEST6366280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:34.667515039 CEST8063661185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:34.667582989 CEST6366180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:34.667939901 CEST8063662185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:34.668015003 CEST6366280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:34.668129921 CEST6366280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:34.673229933 CEST8063662185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:35.370002031 CEST8063662185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:35.370223045 CEST6366280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:35.490056038 CEST6366280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:35.490248919 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:35.495548010 CEST8063662185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:35.495589972 CEST8063663185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:35.495637894 CEST6366280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:35.495682955 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:35.495841026 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:35.500823975 CEST8063663185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:36.203995943 CEST8063663185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:36.204092979 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.318408012 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.327302933 CEST8063663185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:36.562328100 CEST8063663185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:36.562402010 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.677812099 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.678293943 CEST6366480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.683079958 CEST8063663185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:36.683177948 CEST6366380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.683482885 CEST8063664185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:36.683571100 CEST6366480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.683720112 CEST6366480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:36.688786983 CEST8063664185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:37.374027014 CEST8063664185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:37.374139071 CEST6366480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:37.490531921 CEST6366480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:37.490876913 CEST6366580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:37.495748043 CEST8063664185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:37.495830059 CEST6366480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:37.496330023 CEST8063665185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:37.496406078 CEST6366580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:37.496514082 CEST6366580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:37.501715899 CEST8063665185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:38.185995102 CEST8063665185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:38.186074972 CEST6366580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:38.303014040 CEST6366580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:38.303446054 CEST6366680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:38.309108019 CEST8063665185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:38.309202909 CEST6366580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:38.309334993 CEST8063666185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:38.309415102 CEST6366680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:38.309573889 CEST6366680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:38.314516068 CEST8063666185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.010843992 CEST8063666185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.010930061 CEST6366680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.135319948 CEST6366680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.135674953 CEST6366780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.140873909 CEST8063666185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.140964031 CEST6366680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.141251087 CEST8063667185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.141463995 CEST6366780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.141623020 CEST6366780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.146869898 CEST8063667185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.872391939 CEST8063667185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.872726917 CEST6366780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.990366936 CEST6366780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.990669012 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.995637894 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:39.995733023 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:39.995815039 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:40.001962900 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:40.003016949 CEST8063667185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:40.003102064 CEST6366780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:40.723728895 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:40.723913908 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:40.834142923 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:40.839251995 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:41.075207949 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:41.075275898 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.194025040 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.194351912 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.199223995 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:41.199289083 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.199453115 CEST8063669185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:41.199528933 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.199667931 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.420298100 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:41.420470953 CEST6366880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:41.420798063 CEST8063669185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:41.425569057 CEST8063668185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:42.127506018 CEST8063669185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:42.127712011 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.244132996 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.251084089 CEST8063669185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:42.487885952 CEST8063669185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:42.487984896 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.599518061 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.600331068 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.605392933 CEST8063670185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:42.605619907 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.605763912 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.606326103 CEST8063669185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:42.606399059 CEST6366980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:42.610732079 CEST8063670185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:43.334103107 CEST8063670185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:43.334326029 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.443151951 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.449855089 CEST8063670185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:43.688433886 CEST8063670185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:43.688515902 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.861531019 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.862121105 CEST6367180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.872122049 CEST8063671185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:43.872205973 CEST6367180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.872330904 CEST8063670185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:43.872397900 CEST6367080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.874133110 CEST6367180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:43.879089117 CEST8063671185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:44.608421087 CEST8063671185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:44.608532906 CEST6367180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:44.731794119 CEST6367180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:44.732640982 CEST6367280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:44.737437010 CEST8063671185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:44.737545013 CEST6367180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:44.738934994 CEST8063672185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:44.739129066 CEST6367280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:44.739458084 CEST6367280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:44.745999098 CEST8063672185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:45.465293884 CEST8063672185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:45.465389013 CEST6367280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:45.590009928 CEST6367280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:45.590409040 CEST6367380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:45.595637083 CEST8063672185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:45.595711946 CEST6367280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:45.596621037 CEST8063673185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:45.596703053 CEST6367380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:45.596867085 CEST6367380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:45.601768017 CEST8063673185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:46.295151949 CEST8063673185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:46.295275927 CEST6367380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:46.412386894 CEST6367380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:46.412702084 CEST6367480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:46.418154955 CEST8063674185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:46.418277979 CEST6367480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:46.418433905 CEST8063673185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:46.418510914 CEST6367380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:46.418606997 CEST6367480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:46.423882008 CEST8063674185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:47.121989012 CEST8063674185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:47.122375011 CEST6367480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:47.240148067 CEST6367480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:47.240340948 CEST6367580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:47.476478100 CEST8063675185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:47.476567984 CEST6367580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:47.476615906 CEST8063674185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:47.476672888 CEST6367480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:47.476861000 CEST6367580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:47.482850075 CEST8063675185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:48.188256979 CEST8063675185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:48.188350916 CEST6367580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:48.304785967 CEST6367580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:48.305694103 CEST6367680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:48.335696936 CEST8063675185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:48.335788012 CEST6367580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:48.336997032 CEST8063676185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:48.337182999 CEST6367680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:48.337256908 CEST6367680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:48.342545033 CEST8063676185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.026853085 CEST8063676185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.027064085 CEST6367680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.148391008 CEST6367680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.148616076 CEST6367780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.153842926 CEST8063676185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.153923988 CEST8063677185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.153939962 CEST6367680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.154021978 CEST6367780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.154220104 CEST6367780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.159317017 CEST8063677185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.842535973 CEST8063677185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.842755079 CEST6367780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.961637020 CEST6367780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.962191105 CEST6367880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.967113972 CEST8063678185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.967221975 CEST6367880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.967339993 CEST6367880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.967485905 CEST8063677185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:49.967557907 CEST6367780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:49.972417116 CEST8063678185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:50.662727118 CEST8063678185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:50.662820101 CEST6367880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:50.904525995 CEST6367880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:50.908457041 CEST6367980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:50.909807920 CEST8063678185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:50.909899950 CEST6367880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:50.913408041 CEST8063679185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:50.913489103 CEST6367980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:50.916964054 CEST6367980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:50.921871901 CEST8063679185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:51.644586086 CEST8063679185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:51.645001888 CEST6367980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:51.772126913 CEST6367980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:51.772840977 CEST6368080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:51.777317047 CEST8063679185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:51.777432919 CEST6367980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:51.777647972 CEST8063680185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:51.777765036 CEST6368080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:51.778137922 CEST6368080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:51.783026934 CEST8063680185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:52.464641094 CEST8063680185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:52.464837074 CEST6368080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:52.599981070 CEST6368080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:52.600539923 CEST6368180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:52.605237007 CEST8063680185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:52.605310917 CEST6368080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:52.605431080 CEST8063681185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:52.605513096 CEST6368180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:52.605760098 CEST6368180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:52.610531092 CEST8063681185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:53.290354967 CEST8063681185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:53.290623903 CEST6368180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:53.415992975 CEST6368180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:53.416318893 CEST6368280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:53.421183109 CEST8063682185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:53.421339035 CEST6368280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:53.421340942 CEST8063681185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:53.421432972 CEST6368180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:53.421627045 CEST6368280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:53.426470041 CEST8063682185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:54.126311064 CEST8063682185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:54.126585007 CEST6368280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:54.242819071 CEST6368280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:54.243561983 CEST6368380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:54.248250961 CEST8063682185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:54.248374939 CEST6368280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:54.248529911 CEST8063683185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:54.248641968 CEST6368380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:54.249007940 CEST6368380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:54.253884077 CEST8063683185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:54.936507940 CEST8063683185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:54.938946962 CEST6368380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.053478003 CEST6368380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.053778887 CEST6368480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.058661938 CEST8063684185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:55.058824062 CEST6368480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.058964968 CEST8063683185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:55.059036970 CEST6368380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.059149027 CEST6368480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.064034939 CEST8063684185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:55.744399071 CEST8063684185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:55.744507074 CEST6368480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.867249012 CEST6368480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.867595911 CEST6368580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.872478008 CEST8063684185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:55.872559071 CEST8063685185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:55.872567892 CEST6368480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.872637033 CEST6368580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.872770071 CEST6368580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:55.879230976 CEST8063685185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:56.589135885 CEST8063685185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:56.589229107 CEST6368580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:56.709069014 CEST6368580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:56.709444046 CEST6368680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:56.714363098 CEST8063685185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:56.714399099 CEST8063686185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:56.714467049 CEST6368580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:56.714504004 CEST6368680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:56.714623928 CEST6368680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:56.719587088 CEST8063686185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:57.424351931 CEST8063686185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:57.424640894 CEST6368680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:57.541708946 CEST6368680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:57.542121887 CEST6368780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:57.547079086 CEST8063687185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:57.547175884 CEST8063686185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:57.547185898 CEST6368780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:57.547241926 CEST6368680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:57.547421932 CEST6368780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:57.552258968 CEST8063687185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:58.286079884 CEST8063687185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:58.286158085 CEST6368780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:58.399832964 CEST6368780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:58.400156975 CEST6368880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:58.405702114 CEST8063688185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:58.405787945 CEST6368880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:58.405842066 CEST8063687185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:58.405904055 CEST6368780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:58.406039953 CEST6368880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:58.411338091 CEST8063688185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:59.236036062 CEST8063688185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:59.236495018 CEST6368880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:59.351005077 CEST6368880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:59.351367950 CEST6368980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:59.356452942 CEST8063688185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:59.356782913 CEST6368880192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:59.356921911 CEST8063689185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:26:59.360783100 CEST6368980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:59.360903978 CEST6368980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:26:59.366739988 CEST8063689185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:00.067451000 CEST8063689185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:00.067537069 CEST6368980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:00.179209948 CEST6368980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:00.179570913 CEST6369080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:00.184436083 CEST8063690185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:00.184494019 CEST8063689185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:00.184520006 CEST6369080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:00.184560061 CEST6368980192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:00.184675932 CEST6369080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:00.189496040 CEST8063690185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:00.898093939 CEST8063690185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:00.898430109 CEST6369080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.015048027 CEST6369080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.015455961 CEST6369180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.020658970 CEST8063691185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:01.020693064 CEST8063690185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:01.020761013 CEST6369180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.020842075 CEST6369080192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.020960093 CEST6369180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.025825024 CEST8063691185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:01.718612909 CEST8063691185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:01.718699932 CEST6369180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.978254080 CEST6369180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.978534937 CEST6369280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.983504057 CEST8063692185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:01.983537912 CEST8063691185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:01.983576059 CEST6369280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.983612061 CEST6369180192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.983807087 CEST6369280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:01.988951921 CEST8063692185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:02.691826105 CEST8063692185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:02.693859100 CEST6369280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:02.835753918 CEST6369280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:02.836775064 CEST6369380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:02.981064081 CEST8063693185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:02.981187105 CEST8063692185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:02.981215000 CEST6369380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:02.981290102 CEST6369280192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:02.981369972 CEST6369380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:02.986362934 CEST8063693185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:03.700449944 CEST8063693185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:03.700536966 CEST6369380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:03.850018024 CEST6369380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:03.850835085 CEST6369480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:03.855422020 CEST8063693185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:03.855494022 CEST6369380192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:03.855712891 CEST8063694185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:03.855788946 CEST6369480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:03.855961084 CEST6369480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:03.860904932 CEST8063694185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:04.554239035 CEST8063694185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:04.554379940 CEST6369480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:04.714106083 CEST6369480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:04.714550018 CEST6369580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:04.719280005 CEST8063694185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:04.719357014 CEST6369480192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:04.719418049 CEST8063695185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:04.719485044 CEST6369580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:04.719615936 CEST6369580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:04.724395990 CEST8063695185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:05.459724903 CEST8063695185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:05.459809065 CEST6369580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:05.573504925 CEST6369580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:05.573817968 CEST6369680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:05.578789949 CEST8063696185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:05.578918934 CEST6369680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:05.578994036 CEST8063695185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:05.579041004 CEST6369680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:05.579049110 CEST6369580192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:05.583865881 CEST8063696185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:06.285942078 CEST8063696185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:06.288510084 CEST6369680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:06.432147026 CEST6369680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:06.432157040 CEST6369780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:06.437267065 CEST8063697185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:06.437500954 CEST8063696185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:06.437627077 CEST6369680192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:06.437632084 CEST6369780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:06.437750101 CEST6369780192.168.2.4185.208.158.248
                                                                                                                  Sep 28, 2024 09:27:06.442532063 CEST8063697185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:07.125874043 CEST8063697185.208.158.248192.168.2.4
                                                                                                                  Sep 28, 2024 09:27:07.125952005 CEST6369780192.168.2.4185.208.158.248
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Sep 28, 2024 09:25:21.493808985 CEST53507691.1.1.1192.168.2.4
                                                                                                                  Sep 28, 2024 09:25:54.495637894 CEST6146453192.168.2.445.155.250.90
                                                                                                                  Sep 28, 2024 09:25:54.748558044 CEST536146445.155.250.90192.168.2.4
                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                  Sep 28, 2024 09:25:54.495637894 CEST192.168.2.445.155.250.900x5742Standard query (0)ddbnoae.infoA (IP address)IN (0x0001)false
                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                  Sep 28, 2024 09:25:54.748558044 CEST45.155.250.90192.168.2.40x5742No error (0)ddbnoae.info185.208.158.248A (IP address)IN (0x0001)false
                                                                                                                  • ddbnoae.info
                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.463624185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:25:54.833246946 CEST319OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12ebb517aa5c96bd86ed82df14d714bca5817673aa4ce8889b5e4fa9281ae978f271ea771795af8e05c440db22f31dfe339426fa11af66c156adb719a9577e55b8603e983a608cf814c0e7969c3a HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:25:55.540431023 CEST1044INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:25:55 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 33 34 34 0d 0a 36 37 62 36 38 61 38 61 33 32 30 33 61 37 37 62 30 34 31 38 66 35 35 66 36 37 37 35 38 31 64 66 34 36 66 66 38 62 63 38 66 35 31 65 31 38 65 38 62 64 35 37 65 66 31 35 38 35 62 63 63 66 62 35 66 62 63 34 30 61 64 39 30 38 38 62 65 38 64 65 32 32 36 36 65 32 30 38 61 36 62 62 39 64 35 39 32 64 65 30 37 35 34 36 61 62 37 36 65 38 36 36 61 38 33 32 34 62 63 31 66 62 64 30 30 32 63 31 34 33 63 64 37 64 62 62 31 33 66 65 32 64 38 62 32 35 65 35 30 65 61 34 36 36 63 30 34 64 62 61 65 62 34 36 65 37 35 38 37 66 34 33 65 63 32 66 36 36 39 31 33 64 37 39 38 62 66 36 30 66 63 32 65 63 39 36 38 34 33 61 63 64 36 63 39 63 31 37 64 38 35 30 38 66 32 31 62 32 35 63 61 64 65 65 35 39 33 66 65 62 37 63 63 63 66 66 37 61 62 31 38 35 65 63 64 35 34 61 65 36 33 35 63 31 31 34 32 62 35 66 35 61 32 32 66 64 32 34 37 34 30 38 37 38 62 62 65 64 38 62 66 34 38 33 32 64 35 31 65 36 35 37 37 61 32 34 66 61 33 34 35 63 66 31 65 32 65 36 38 38 66 33 32 30 37 39 61 63 65 37 34 33 39 32 38 34 66 62 37 31 32 36 31 [TRUNCATED]
                                                                                                                  Data Ascii: 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
                                                                                                                  Sep 28, 2024 09:25:58.178066015 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:25:58.426983118 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:25:58 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:25:58.537240982 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:25:58.781683922 CEST900INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:25:58 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 32 62 34 0d 0a 36 37 62 36 39 63 39 35 33 38 30 34 62 32 36 62 35 36 35 66 65 39 35 62 33 32 31 62 64 31 39 61 35 35 66 37 38 63 64 32 65 64 31 63 30 31 65 61 61 32 35 35 66 34 30 32 64 31 66 61 38 31 65 63 39 34 38 37 34 64 38 62 34 66 64 32 66 62 64 66 33 37 33 36 62 39 34 65 66 65 64 31 64 61 31 38 32 38 65 31 37 64 35 61 61 64 37 35 66 36 36 63 61 38 33 37 35 33 64 65 66 62 64 61 31 36 63 32 34 30 63 65 36 33 62 31 31 30 66 63 33 39 38 62 32 36 65 34 31 30 61 64 36 32 63 30 34 64 62 63 65 35 35 30 65 62 35 64 36 31 34 31 65 66 32 63 36 64 39 36 33 62 36 37 38 65 66 34 31 39 63 32 66 31 39 37 39 61 33 39 64 33 36 65 39 30 31 36 63 36 35 32 38 65 32 63 62 63 35 63 62 33 65 39 35 66 32 61 65 63 37 65 64 36 65 33 37 38 62 66 39 31 65 65 64 31 34 33 66 38 33 63 63 31 31 63 33 31 35 64 35 61 32 30 65 38 32 34 37 62 30 61 37 38 62 38 65 63 38 34 65 30 38 37 32 38 35 38 66 38 35 64 37 33 32 35 66 34 32 65 35 64 66 37 66 63 65 63 38 64 66 33 33 63 36 35 61 35 65 64 34 65 38 63 38 35 66 65 37 33 33 39 31 [TRUNCATED]
                                                                                                                  Data Ascii: 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


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  1192.168.2.463628185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:25:58.903218031 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:25:59.621717930 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:25:59 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  2192.168.2.463629185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:25:59.747534990 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:00.434387922 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:00 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  3192.168.2.463630185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:00.591706038 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:01.281862020 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:01 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  4192.168.2.463631185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:01.406928062 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:02.092626095 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:02 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  5192.168.2.463632185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:02.216139078 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:03.049871922 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:02 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:03.163912058 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:03.410763979 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:03 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  6192.168.2.463633185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:03.538916111 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:04.247778893 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:04 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  7192.168.2.463634185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:04.370587111 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:05.051310062 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:04 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:05.161781073 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:05.402781010 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:05 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  8192.168.2.463635185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:05.526822090 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:06.221194983 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:06 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:06.334950924 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:06.572079897 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:06 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  9192.168.2.463636185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:06.701957941 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:07.388587952 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:07 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  10192.168.2.463637185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:07.522203922 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:08.221177101 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:08 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:08.333986998 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:08.860011101 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:08 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:08.860333920 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:08 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  11192.168.2.463638185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:08.987015963 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:09.679363966 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:09 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  12192.168.2.463639185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:09.809988022 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:10.499979973 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:10 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  13192.168.2.463640185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:10.621484041 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:11.308670998 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:11 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  14192.168.2.463641185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:11.682785034 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:12.376364946 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:12 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  15192.168.2.463642185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:12.551276922 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:13.237262011 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:13 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:13.349365950 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:13.584573030 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:13 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:13.693576097 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:13.929151058 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:13 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  16192.168.2.463643185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:14.059978962 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:14.767263889 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:14 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  17192.168.2.463644185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:15.932621002 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:16.652307034 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:16 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  18192.168.2.463645185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:16.776658058 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:17.730667114 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:17 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:17.730720997 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:17 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  19192.168.2.463646185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:17.858730078 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:18.544666052 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:18 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  20192.168.2.463647185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:18.667742014 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:19.350874901 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:19 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:19.458714962 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:19.693502903 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:19 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:19.804538965 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:20.039589882 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:19 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:20.146485090 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:20.680558920 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:20 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  21192.168.2.463648185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:20.816446066 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:21.508894920 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:21 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  22192.168.2.463649185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:21.636413097 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:22.322309017 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:22 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  23192.168.2.463650185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:22.448715925 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:23.835563898 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:23 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:23.835656881 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:23 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:23.835690975 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:23 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:23.945981979 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:24.188489914 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:24 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  24192.168.2.463651185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:24.308002949 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:24.988037109 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:24 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:25.099764109 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:25.408510923 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:26.017880917 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:26.310414076 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:26 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  25192.168.2.463652185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:26.432795048 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:27.125190020 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:27 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  26192.168.2.463653185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:27.245536089 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:27.947992086 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:27 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  27192.168.2.463654185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:28.075476885 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:28.766494989 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:28 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  28192.168.2.463655185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:28.886018038 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:29.576410055 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:29 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  29192.168.2.463656185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:29.699425936 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:30.401570082 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:30 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  30192.168.2.463657185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:30.527215958 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:31.246319056 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:31 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  31192.168.2.463658185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:31.375456095 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:32.056621075 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:31 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  32192.168.2.463659185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:32.184907913 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:32.872776985 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:32 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  33192.168.2.463660185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:33.000049114 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:33.717663050 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:33 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  34192.168.2.463661185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:33.840281010 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:34.540162086 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:34 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  35192.168.2.463662185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:34.668129921 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:35.370002031 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:35 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  36192.168.2.463663185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:35.495841026 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:36.203995943 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:36 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:36.318408012 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:36.562328100 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:36 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  37192.168.2.463664185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:36.683720112 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:37.374027014 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:37 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  38192.168.2.463665185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:37.496514082 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:38.185995102 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:38 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  39192.168.2.463666185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:38.309573889 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:39.010843992 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:38 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  40192.168.2.463667185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:39.141623020 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:39.872391939 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:39 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  41192.168.2.463668185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:39.995815039 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:40.723728895 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:40 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:40.834142923 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:41.075207949 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:40 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  42192.168.2.463669185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:41.199667931 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:42.127506018 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:42 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:42.244132996 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:42.487885952 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:42 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  43192.168.2.463670185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:42.605763912 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:43.334103107 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:43 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20
                                                                                                                  Sep 28, 2024 09:26:43.443151951 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:43.688433886 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:43 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  44192.168.2.463671185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:43.874133110 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:44.608421087 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:44 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  45192.168.2.463672185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:44.739458084 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:45.465293884 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:45 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  46192.168.2.463673185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:45.596867085 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:46.295151949 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:46 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  47192.168.2.463674185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:46.418606997 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:47.121989012 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:47 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  48192.168.2.463675185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:47.476861000 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:48.188256979 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:48 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  49192.168.2.463676185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:48.337256908 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:49.026853085 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:48 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  50192.168.2.463677185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:49.154220104 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:49.842535973 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:49 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  51192.168.2.463678185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:49.967339993 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:50.662727118 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:50 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  52192.168.2.463679185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:50.916964054 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:51.644586086 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:51 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  53192.168.2.463680185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:51.778137922 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:52.464641094 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:52 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  54192.168.2.463681185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:52.605760098 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:53.290354967 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:53 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  55192.168.2.463682185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:53.421627045 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:54.126311064 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:54 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  56192.168.2.463683185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:54.249007940 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:54.936507940 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:54 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  57192.168.2.463684185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:55.059149027 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:55.744399071 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:55 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  58192.168.2.463685185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:55.872770071 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:56.589135885 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:56 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  59192.168.2.463686185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:56.714623928 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:57.424351931 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:57 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  60192.168.2.463687185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:57.547421932 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:58.286079884 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:58 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  61192.168.2.463688185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:58.406039953 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:26:59.236036062 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:59 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  62192.168.2.463689185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:26:59.360903978 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:00.067451000 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:26:59 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  63192.168.2.463690185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:00.184675932 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:00.898093939 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:00 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  64192.168.2.463691185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:01.020960093 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:01.718612909 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:01 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  65192.168.2.463692185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:01.983807087 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:02.691826105 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:02 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  66192.168.2.463693185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:02.981369972 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:03.700449944 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:03 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  67192.168.2.463694185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:03.855961084 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:04.554239035 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:04 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  68192.168.2.463695185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:04.719615936 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:05.459724903 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:05 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  69192.168.2.463696185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:05.579041004 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:06.285942078 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:06 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  70192.168.2.463697185.208.158.248807572C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Sep 28, 2024 09:27:06.437750101 CEST327OUTGET /search/?q=67e28dd86d55f128470aac1a7c27d78406abdd88be4b12eab517aa5c96bd86e8908e4a865a8bbc896c58e713bc90c91936b5281fc235a925ed3e51d6bd974a95129070b413e96cc92be510b866db52b2e34ae84c2b14a82966836f23d7f210c7ed929f3bc56c9017 HTTP/1.1
                                                                                                                  Host: ddbnoae.info
                                                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                                                  Sep 28, 2024 09:27:07.125874043 CEST220INHTTP/1.1 200 OK
                                                                                                                  Server: nginx/1.20.1
                                                                                                                  Date: Sat, 28 Sep 2024 07:27:07 GMT
                                                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: keep-alive
                                                                                                                  X-Powered-By: PHP/7.4.33
                                                                                                                  Data Raw: 65 0d 0a 36 37 62 36 38 30 38 31 33 30 30 38 63 32 0d 0a 30 0d 0a 0d 0a
                                                                                                                  Data Ascii: e67b680813008c20


                                                                                                                  Click to jump to process

                                                                                                                  Click to jump to process

                                                                                                                  Click to dive into process behavior distribution

                                                                                                                  Click to jump to process

                                                                                                                  Target ID:0
                                                                                                                  Start time:03:24:59
                                                                                                                  Start date:28/09/2024
                                                                                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe"
                                                                                                                  Imagebase:0x400000
                                                                                                                  File size:3'208'313 bytes
                                                                                                                  MD5 hash:4E277B4187525CD19CD7269A4DAF9FC1
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:low
                                                                                                                  Has exited:false

                                                                                                                  Target ID:1
                                                                                                                  Start time:03:25:00
                                                                                                                  Start date:28/09/2024
                                                                                                                  Path:C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-NOUJM.tmp\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.tmp" /SL5="$2046A,2942017,56832,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Crypt.31282.17969.exe"
                                                                                                                  Imagebase:0x400000
                                                                                                                  File size:708'608 bytes
                                                                                                                  MD5 hash:5D678A5E268C0BAD90CD1584C53048AD
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:low
                                                                                                                  Has exited:false

                                                                                                                  Target ID:2
                                                                                                                  Start time:03:25:01
                                                                                                                  Start date:28/09/2024
                                                                                                                  Path:C:\Users\user\AppData\Local\Play Glock\playglock.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Users\user\AppData\Local\Play Glock\playglock.exe" -i
                                                                                                                  Imagebase:0x400000
                                                                                                                  File size:2'916'352 bytes
                                                                                                                  MD5 hash:31590895739E872769BF62DD513196B7
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000002.00000002.2950521336.0000000002841000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  Antivirus matches:
                                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                                  Reputation:low
                                                                                                                  Has exited:false

                                                                                                                  Reset < >

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:21.5%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:2.4%
                                                                                                                    Total number of Nodes:1520
                                                                                                                    Total number of Limit Nodes:22
                                                                                                                    execution_graph 5445 407548 5446 407554 CloseHandle 5445->5446 5447 40755d 5445->5447 5446->5447 6682 402b48 RaiseException 5887 407749 5888 4076dc WriteFile 5887->5888 5893 407724 5887->5893 5889 4076e8 5888->5889 5890 4076ef 5888->5890 5891 40748c 35 API calls 5889->5891 5892 407700 5890->5892 5894 4073ec 34 API calls 5890->5894 5891->5890 5893->5887 5895 4077e0 5893->5895 5894->5892 5896 4078db InterlockedExchange 5895->5896 5898 407890 5895->5898 5897 4078e7 5896->5897 6683 40294a 6684 402952 6683->6684 6685 402967 6684->6685 6686 403554 4 API calls 6684->6686 6686->6684 6687 403f4a 6688 403f53 6687->6688 6689 403f5c 6687->6689 6691 403f07 6688->6691 6694 403f09 6691->6694 6692 403f3c 6692->6689 6695 403154 4 API calls 6694->6695 6697 403e9c 6694->6697 6700 403f3d 6694->6700 6714 403e9c 6694->6714 6695->6694 6696 403ef2 6699 402674 4 API calls 6696->6699 6697->6692 6697->6696 6702 403ea9 6697->6702 6705 403e8e 6697->6705 6704 403ecf 6699->6704 6700->6689 6703 402674 4 API calls 6702->6703 6702->6704 6703->6704 6704->6689 6706 403e4c 6705->6706 6707 403e62 6706->6707 6708 403e7b 6706->6708 6710 403e67 6706->6710 6709 403cc8 4 API calls 6707->6709 6711 402674 4 API calls 6708->6711 6709->6710 6712 403e78 6710->6712 6713 402674 4 API calls 6710->6713 6711->6712 6712->6696 6712->6702 6713->6712 6715 403ed7 6714->6715 6721 403ea9 6714->6721 6716 403ef2 6715->6716 6718 403e8e 4 API calls 6715->6718 6719 402674 4 API calls 6716->6719 6717 403ecf 6717->6694 6720 403ee6 6718->6720 6719->6717 6720->6716 6720->6721 6721->6717 6722 402674 4 API calls 6721->6722 6722->6717 6241 40ac4f 6242 40abc1 6241->6242 6243 4094d8 9 API calls 6242->6243 6245 40abed 6242->6245 6243->6245 6244 40ac06 6246 40ac1a 6244->6246 6247 40ac0f DestroyWindow 6244->6247 6245->6244 6248 40ac00 RemoveDirectoryA 6245->6248 6249 40ac42 6246->6249 6250 40357c 4 API calls 6246->6250 6247->6246 6248->6244 6251 40ac38 6250->6251 6252 4025ac 4 API calls 6251->6252 6252->6249 6253 403a52 6254 403a74 6253->6254 6255 403a5a WriteFile 6253->6255 6255->6254 6256 403a78 GetLastError 6255->6256 6256->6254 6257 402654 6258 403154 4 API calls 6257->6258 6259 402614 6258->6259 6260 403154 4 API calls 6259->6260 6261 402632 6259->6261 6260->6261 6262 40ac56 6263 40ac5d 6262->6263 6265 40ac88 6262->6265 6272 409448 6263->6272 6267 403198 4 API calls 6265->6267 6266 40ac62 6266->6265 6269 40ac80 MessageBoxA 6266->6269 6268 40acc0 6267->6268 6270 403198 4 API calls 6268->6270 6269->6265 6271 40acc8 6270->6271 6273 409454 GetCurrentProcess OpenProcessToken 6272->6273 6274 4094af ExitWindowsEx 6272->6274 6275 409466 6273->6275 6276 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6273->6276 6274->6275 6275->6266 6276->6274 6276->6275 6731 40995e 6733 409960 6731->6733 6732 409982 6733->6732 6734 40999e CallWindowProcA 6733->6734 6734->6732 6735 409960 6736 409982 6735->6736 6738 40996f 6735->6738 6737 40999e CallWindowProcA 6737->6736 6738->6736 6738->6737 6739 405160 6740 405173 6739->6740 6741 404e58 33 API calls 6740->6741 6742 405187 6741->6742 6277 402e64 6278 402e69 6277->6278 6279 402e7a RtlUnwind 6278->6279 6280 402e5e 6278->6280 6281 402e9d 6279->6281 5899 40766c SetFilePointer 5900 4076a3 5899->5900 5901 407693 GetLastError 5899->5901 5901->5900 5902 40769c 5901->5902 5903 40748c 35 API calls 5902->5903 5903->5900 6294 40667c IsDBCSLeadByte 6295 406694 6294->6295 6755 403f7d 6756 403fa2 6755->6756 6759 403f84 6755->6759 6758 403e8e 4 API calls 6756->6758 6756->6759 6757 403f8c 6758->6759 6759->6757 6760 402674 4 API calls 6759->6760 6761 403fca 6760->6761 6762 403d02 6768 403d12 6762->6768 6763 403ddf ExitProcess 6764 403db8 6765 403cc8 4 API calls 6764->6765 6767 403dc2 6765->6767 6766 403dea 6769 403cc8 4 API calls 6767->6769 6768->6763 6768->6764 6768->6766 6768->6768 6772 403da4 6768->6772 6773 403d8f MessageBoxA 6768->6773 6770 403dcc 6769->6770 6782 4019dc 6770->6782 6778 403fe4 6772->6778 6773->6764 6774 403dd1 6774->6763 6774->6766 6779 403fe8 6778->6779 6780 403f07 4 API calls 6779->6780 6781 404006 6780->6781 6783 401abb 6782->6783 6784 4019ed 6782->6784 6783->6774 6785 401a04 RtlEnterCriticalSection 6784->6785 6786 401a0e LocalFree 6784->6786 6785->6786 6787 401a41 6786->6787 6788 401a2f VirtualFree 6787->6788 6789 401a49 6787->6789 6788->6787 6790 401a70 LocalFree 6789->6790 6791 401a87 6789->6791 6790->6790 6790->6791 6792 401aa9 RtlDeleteCriticalSection 6791->6792 6793 401a9f RtlLeaveCriticalSection 6791->6793 6792->6774 6793->6792 6300 404206 6301 4041cc 6300->6301 6304 40420a 6300->6304 6302 404282 6303 403154 4 API calls 6305 404323 6303->6305 6304->6302 6304->6303 6306 402c08 6307 402c82 6306->6307 6310 402c19 6306->6310 6308 402c56 RtlUnwind 6309 403154 4 API calls 6308->6309 6309->6307 6310->6307 6310->6308 6313 402b28 6310->6313 6314 402b31 RaiseException 6313->6314 6315 402b47 6313->6315 6314->6315 6315->6308 6316 408c10 6317 408c17 6316->6317 6318 403198 4 API calls 6317->6318 6326 408cb1 6318->6326 6319 408cdc 6320 4031b8 4 API calls 6319->6320 6321 408d69 6320->6321 6322 408cc8 6324 4032fc 18 API calls 6322->6324 6323 403278 18 API calls 6323->6326 6324->6319 6325 4032fc 18 API calls 6325->6326 6326->6319 6326->6322 6326->6323 6326->6325 6331 40a814 6332 40a839 6331->6332 6333 40993c 29 API calls 6332->6333 6336 40a83e 6333->6336 6334 40a891 6365 4026c4 GetSystemTime 6334->6365 6336->6334 6339 408dd8 18 API calls 6336->6339 6337 40a896 6338 409330 46 API calls 6337->6338 6340 40a89e 6338->6340 6341 40a86d 6339->6341 6342 4031e8 18 API calls 6340->6342 6345 40a875 MessageBoxA 6341->6345 6343 40a8ab 6342->6343 6344 406928 19 API calls 6343->6344 6346 40a8b8 6344->6346 6345->6334 6347 40a882 6345->6347 6348 4066c0 19 API calls 6346->6348 6349 405864 19 API calls 6347->6349 6350 40a8c8 6348->6350 6349->6334 6351 406638 19 API calls 6350->6351 6352 40a8d9 6351->6352 6353 403340 18 API calls 6352->6353 6354 40a8e7 6353->6354 6355 4031e8 18 API calls 6354->6355 6356 40a8f7 6355->6356 6357 4074e0 37 API calls 6356->6357 6358 40a936 6357->6358 6359 402594 18 API calls 6358->6359 6360 40a956 6359->6360 6361 407a28 19 API calls 6360->6361 6362 40a998 6361->6362 6363 407cb8 35 API calls 6362->6363 6364 40a9bf 6363->6364 6365->6337 5443 407017 5444 407008 SetErrorMode 5443->5444 6366 403018 6367 403070 6366->6367 6368 403025 6366->6368 6369 40302a RtlUnwind 6368->6369 6370 40304e 6369->6370 6372 402f78 6370->6372 6373 402be8 6370->6373 6374 402bf1 RaiseException 6373->6374 6375 402c04 6373->6375 6374->6375 6375->6367 6380 40901e 6381 409010 6380->6381 6382 408fac Wow64RevertWow64FsRedirection 6381->6382 6383 409018 6382->6383 6384 409020 SetLastError 6385 409029 6384->6385 6400 403a28 ReadFile 6401 403a46 6400->6401 6402 403a49 GetLastError 6400->6402 5904 40762c ReadFile 5905 407663 5904->5905 5906 40764c 5904->5906 5907 407652 GetLastError 5906->5907 5908 40765c 5906->5908 5907->5905 5907->5908 5909 40748c 35 API calls 5908->5909 5909->5905 6804 40712e 6805 407118 6804->6805 6806 403198 4 API calls 6805->6806 6807 407120 6806->6807 6808 403198 4 API calls 6807->6808 6809 407128 6808->6809 5924 40a82f 5925 409ae8 18 API calls 5924->5925 5926 40a834 5925->5926 5927 40a839 5926->5927 5928 402f24 5 API calls 5926->5928 5961 40993c 5927->5961 5928->5927 5930 40a891 5966 4026c4 GetSystemTime 5930->5966 5932 40a83e 5932->5930 6027 408dd8 5932->6027 5933 40a896 5967 409330 5933->5967 5937 40a86d 5941 40a875 MessageBoxA 5937->5941 5938 4031e8 18 API calls 5939 40a8ab 5938->5939 5985 406928 5939->5985 5941->5930 5943 40a882 5941->5943 6030 405864 5943->6030 5948 40a8d9 6012 403340 5948->6012 5950 40a8e7 5951 4031e8 18 API calls 5950->5951 5952 40a8f7 5951->5952 5953 4074e0 37 API calls 5952->5953 5954 40a936 5953->5954 5955 402594 18 API calls 5954->5955 5956 40a956 5955->5956 5957 407a28 19 API calls 5956->5957 5958 40a998 5957->5958 5959 407cb8 35 API calls 5958->5959 5960 40a9bf 5959->5960 6034 40953c 5961->6034 5964 4098cc 19 API calls 5965 40995c 5964->5965 5965->5932 5966->5933 5976 409350 5967->5976 5970 409375 CreateDirectoryA 5971 4093ed 5970->5971 5972 40937f GetLastError 5970->5972 5973 40322c 4 API calls 5971->5973 5972->5976 5974 4093f7 5973->5974 5977 4031b8 4 API calls 5974->5977 5975 408dd8 18 API calls 5975->5976 5976->5970 5976->5975 5978 404c94 33 API calls 5976->5978 5981 407284 19 API calls 5976->5981 5983 408da8 18 API calls 5976->5983 5984 405890 18 API calls 5976->5984 6090 406cf4 5976->6090 6113 409224 5976->6113 5979 409411 5977->5979 5978->5976 5980 4031b8 4 API calls 5979->5980 5982 40941e 5980->5982 5981->5976 5982->5938 5983->5976 5984->5976 6219 406820 5985->6219 5988 403454 18 API calls 5989 40694a 5988->5989 5990 4066c0 5989->5990 6224 4068e4 5990->6224 5993 4066f0 5995 403340 18 API calls 5993->5995 5994 4066fe 5996 403454 18 API calls 5994->5996 5998 4066fc 5995->5998 5997 406711 5996->5997 5999 403340 18 API calls 5997->5999 6000 403198 4 API calls 5998->6000 5999->5998 6001 406733 6000->6001 6002 406638 6001->6002 6003 406642 6002->6003 6004 406665 6002->6004 6230 406950 6003->6230 6005 40322c 4 API calls 6004->6005 6008 40666e 6005->6008 6007 406649 6007->6004 6009 406654 6007->6009 6008->5948 6010 403340 18 API calls 6009->6010 6011 406662 6010->6011 6011->5948 6013 403344 6012->6013 6016 4033a5 6012->6016 6014 4031e8 6013->6014 6015 40334c 6013->6015 6019 403254 18 API calls 6014->6019 6022 4031fc 6014->6022 6015->6016 6017 40335b 6015->6017 6020 4031e8 18 API calls 6015->6020 6021 403254 18 API calls 6017->6021 6018 403228 6018->5950 6019->6022 6020->6017 6024 403375 6021->6024 6022->6018 6023 4025ac 4 API calls 6022->6023 6023->6018 6025 4031e8 18 API calls 6024->6025 6026 4033a1 6025->6026 6026->5950 6028 408da8 18 API calls 6027->6028 6029 408df4 6028->6029 6029->5937 6031 405869 6030->6031 6032 405940 19 API calls 6031->6032 6033 40587b 6032->6033 6033->6033 6041 40955b 6034->6041 6035 409590 6037 40959d GetUserDefaultLangID 6035->6037 6042 409592 6035->6042 6036 409594 6046 407024 GetModuleHandleA GetProcAddress 6036->6046 6037->6042 6040 40956f 6040->5964 6041->6035 6041->6036 6041->6040 6042->6040 6043 4095cb GetACP 6042->6043 6044 4095ef 6042->6044 6043->6040 6043->6042 6044->6040 6045 409615 GetACP 6044->6045 6045->6040 6045->6044 6047 407067 6046->6047 6048 40705e 6046->6048 6049 407070 6047->6049 6050 4070a8 6047->6050 6057 403198 4 API calls 6048->6057 6067 406f68 6049->6067 6051 406f68 RegOpenKeyExA 6050->6051 6055 4070c1 6051->6055 6053 407089 6054 4070de 6053->6054 6070 406f5c 6053->6070 6059 40322c 4 API calls 6054->6059 6055->6054 6058 406f5c 20 API calls 6055->6058 6061 407120 6057->6061 6062 4070d5 RegCloseKey 6058->6062 6063 4070eb 6059->6063 6064 403198 4 API calls 6061->6064 6062->6054 6065 4032fc 18 API calls 6063->6065 6066 407128 6064->6066 6065->6048 6066->6042 6068 406f73 6067->6068 6069 406f79 RegOpenKeyExA 6067->6069 6068->6069 6069->6053 6073 406e10 6070->6073 6074 406e36 RegQueryValueExA 6073->6074 6075 406e59 6074->6075 6080 406e7b 6074->6080 6076 406e73 6075->6076 6075->6080 6081 403278 18 API calls 6075->6081 6082 403420 18 API calls 6075->6082 6078 403198 4 API calls 6076->6078 6077 403198 4 API calls 6079 406f47 RegCloseKey 6077->6079 6078->6080 6079->6054 6080->6077 6081->6075 6083 406eb0 RegQueryValueExA 6082->6083 6083->6074 6084 406ecc 6083->6084 6084->6080 6085 4034f0 18 API calls 6084->6085 6086 406f0e 6085->6086 6087 406f20 6086->6087 6089 403420 18 API calls 6086->6089 6088 4031e8 18 API calls 6087->6088 6088->6080 6089->6087 6132 406a58 6090->6132 6094 406a58 19 API calls 6096 406d36 6094->6096 6095 406d26 6095->6094 6097 406d72 6095->6097 6098 406d42 6096->6098 6100 406a34 21 API calls 6096->6100 6140 406888 6097->6140 6098->6097 6101 406d67 6098->6101 6104 406a58 19 API calls 6098->6104 6100->6098 6101->6097 6152 406cc8 GetWindowsDirectoryA 6101->6152 6106 406d5b 6104->6106 6105 406638 19 API calls 6107 406d87 6105->6107 6106->6101 6108 406a34 21 API calls 6106->6108 6109 40322c 4 API calls 6107->6109 6108->6101 6110 406d91 6109->6110 6111 4031b8 4 API calls 6110->6111 6112 406dab 6111->6112 6112->5976 6114 409244 6113->6114 6115 406638 19 API calls 6114->6115 6116 40925d 6115->6116 6117 40322c 4 API calls 6116->6117 6124 409268 6117->6124 6119 406978 20 API calls 6119->6124 6120 4033b4 18 API calls 6120->6124 6121 408dd8 18 API calls 6121->6124 6122 405890 18 API calls 6122->6124 6124->6119 6124->6120 6124->6121 6124->6122 6125 4092e4 6124->6125 6192 4091b0 6124->6192 6200 409034 6124->6200 6126 40322c 4 API calls 6125->6126 6127 4092ef 6126->6127 6128 4031b8 4 API calls 6127->6128 6129 409309 6128->6129 6130 403198 4 API calls 6129->6130 6131 409311 6130->6131 6131->5976 6133 4034f0 18 API calls 6132->6133 6135 406a6b 6133->6135 6134 406a82 GetEnvironmentVariableA 6134->6135 6136 406a8e 6134->6136 6135->6134 6139 406a95 6135->6139 6154 406dec 6135->6154 6137 403198 4 API calls 6136->6137 6137->6139 6139->6095 6149 406a34 6139->6149 6141 403414 6140->6141 6142 4068ab GetFullPathNameA 6141->6142 6143 4068b7 6142->6143 6144 4068ce 6142->6144 6143->6144 6145 4068bf 6143->6145 6146 40322c 4 API calls 6144->6146 6147 403278 18 API calls 6145->6147 6148 4068cc 6146->6148 6147->6148 6148->6105 6158 4069dc 6149->6158 6153 406ce9 6152->6153 6153->6097 6155 406dfa 6154->6155 6156 4034f0 18 API calls 6155->6156 6157 406e08 6156->6157 6157->6135 6165 406978 6158->6165 6160 4069fe 6161 406a06 GetFileAttributesA 6160->6161 6162 406a1b 6161->6162 6163 403198 4 API calls 6162->6163 6164 406a23 6163->6164 6164->6095 6175 406744 6165->6175 6167 4069b0 6170 4069c6 6167->6170 6171 4069bb 6167->6171 6169 406989 6169->6167 6182 406970 CharPrevA 6169->6182 6183 403454 6170->6183 6172 40322c 4 API calls 6171->6172 6174 4069c4 6172->6174 6174->6160 6179 406755 6175->6179 6176 4067b9 6177 406680 IsDBCSLeadByte 6176->6177 6178 4067b4 6176->6178 6177->6178 6178->6169 6179->6176 6181 406773 6179->6181 6181->6178 6190 406680 IsDBCSLeadByte 6181->6190 6182->6169 6184 403486 6183->6184 6185 403459 6183->6185 6186 403198 4 API calls 6184->6186 6185->6184 6188 40346d 6185->6188 6187 40347c 6186->6187 6187->6174 6189 403278 18 API calls 6188->6189 6189->6187 6191 406694 6190->6191 6191->6181 6193 403198 4 API calls 6192->6193 6195 4091d1 6193->6195 6197 4091fe 6195->6197 6209 4032a8 6195->6209 6212 403494 6195->6212 6198 403198 4 API calls 6197->6198 6199 409213 6198->6199 6199->6124 6201 408f70 2 API calls 6200->6201 6202 40904a 6201->6202 6203 40904e 6202->6203 6216 406a48 6202->6216 6203->6124 6206 409081 6207 408fac Wow64RevertWow64FsRedirection 6206->6207 6208 409089 6207->6208 6208->6124 6210 403278 18 API calls 6209->6210 6211 4032b5 6210->6211 6211->6195 6213 403498 6212->6213 6215 4034c3 6212->6215 6214 4034f0 18 API calls 6213->6214 6214->6215 6215->6195 6217 4069dc 21 API calls 6216->6217 6218 406a52 GetLastError 6217->6218 6218->6206 6220 406744 IsDBCSLeadByte 6219->6220 6222 406835 6220->6222 6221 40687f 6221->5988 6222->6221 6223 406680 IsDBCSLeadByte 6222->6223 6223->6222 6225 4068f3 6224->6225 6226 406820 IsDBCSLeadByte 6225->6226 6228 4068fe 6226->6228 6227 4066ea 6227->5993 6227->5994 6228->6227 6229 406680 IsDBCSLeadByte 6228->6229 6229->6228 6231 406957 6230->6231 6232 40695b 6230->6232 6231->6007 6235 406970 CharPrevA 6232->6235 6234 40696c 6234->6007 6235->6234 6810 408f30 6813 408dfc 6810->6813 6814 408e05 6813->6814 6815 403198 4 API calls 6814->6815 6816 408e13 6814->6816 6815->6814 6817 403932 6818 403924 6817->6818 6819 40374c VariantClear 6818->6819 6820 40392c 6819->6820 5380 4075c4 SetFilePointer 5381 4075f7 5380->5381 5382 4075e7 GetLastError 5380->5382 5382->5381 5383 4075f0 5382->5383 5385 40748c GetLastError 5383->5385 5388 4073ec 5385->5388 5389 407284 19 API calls 5388->5389 5390 407414 5389->5390 5391 407434 5390->5391 5392 405194 33 API calls 5390->5392 5393 405890 18 API calls 5391->5393 5392->5391 5394 407443 5393->5394 5395 403198 4 API calls 5394->5395 5396 407460 5395->5396 5396->5381 6411 4076c8 WriteFile 6412 4076e8 6411->6412 6413 4076ef 6411->6413 6414 40748c 35 API calls 6412->6414 6415 407700 6413->6415 6416 4073ec 34 API calls 6413->6416 6414->6413 6416->6415 6417 402ccc 6420 402cfe 6417->6420 6421 402cdd 6417->6421 6418 402d88 RtlUnwind 6419 403154 4 API calls 6418->6419 6419->6420 6421->6418 6421->6420 6422 402b28 RaiseException 6421->6422 6423 402d7f 6422->6423 6423->6418 6829 403fcd 6830 403f07 4 API calls 6829->6830 6831 403fd6 6830->6831 6832 403e9c 4 API calls 6831->6832 6833 403fe2 6832->6833 6430 4024d0 6431 4024e4 6430->6431 6432 4024e9 6430->6432 6435 401918 4 API calls 6431->6435 6433 402518 6432->6433 6434 40250e RtlEnterCriticalSection 6432->6434 6437 4024ed 6432->6437 6445 402300 6433->6445 6434->6433 6435->6432 6438 402525 6441 402581 6438->6441 6442 402577 RtlLeaveCriticalSection 6438->6442 6440 401fd4 14 API calls 6443 402531 6440->6443 6442->6441 6443->6438 6444 40215c 9 API calls 6443->6444 6444->6438 6446 402314 6445->6446 6448 4023b8 6446->6448 6450 402335 6446->6450 6447 402344 6447->6438 6447->6440 6448->6447 6449 401d80 9 API calls 6448->6449 6453 402455 6448->6453 6455 401e84 6448->6455 6449->6448 6450->6447 6452 401b74 9 API calls 6450->6452 6452->6447 6453->6447 6454 401d00 9 API calls 6453->6454 6454->6447 6460 401768 6455->6460 6457 401e99 6458 401ea6 6457->6458 6459 401dcc 9 API calls 6457->6459 6458->6448 6459->6458 6462 401787 6460->6462 6461 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6461->6462 6462->6461 6463 40183b 6462->6463 6465 40132c LocalAlloc 6462->6465 6466 401821 6462->6466 6467 4017d6 6462->6467 6464 4015c4 VirtualAlloc 6463->6464 6468 4017e7 6463->6468 6464->6468 6465->6462 6469 40150c VirtualFree 6466->6469 6470 40150c VirtualFree 6467->6470 6468->6457 6469->6468 6470->6468 6471 4028d2 6472 4028da 6471->6472 6473 403554 4 API calls 6472->6473 6474 4028ef 6472->6474 6473->6472 6475 4025ac 4 API calls 6474->6475 6476 4028f4 6475->6476 6834 4019d3 6835 4019ba 6834->6835 6836 4019c3 RtlLeaveCriticalSection 6835->6836 6837 4019cd 6835->6837 6836->6837 5397 407fd4 5398 407fe6 5397->5398 5400 407fed 5397->5400 5408 407f10 5398->5408 5402 408017 5400->5402 5404 408015 5400->5404 5406 408021 5400->5406 5401 40804e 5419 407d7c 5402->5419 5403 407d7c 33 API calls 5403->5401 5422 407e2c 5404->5422 5406->5401 5406->5403 5409 407f25 5408->5409 5410 407d7c 33 API calls 5409->5410 5411 407f34 5409->5411 5410->5411 5412 407f6e 5411->5412 5413 407d7c 33 API calls 5411->5413 5414 407f82 5412->5414 5415 407d7c 33 API calls 5412->5415 5413->5412 5418 407fae 5414->5418 5429 407eb8 5414->5429 5415->5414 5418->5400 5432 4058c4 5419->5432 5421 407d9e 5421->5406 5423 405194 33 API calls 5422->5423 5424 407e57 5423->5424 5440 407de4 5424->5440 5426 407e5f 5427 403198 4 API calls 5426->5427 5428 407e74 5427->5428 5428->5406 5430 407ec7 VirtualFree 5429->5430 5431 407ed9 VirtualAlloc 5429->5431 5430->5431 5431->5418 5434 4058d0 5432->5434 5433 405194 33 API calls 5435 4058fd 5433->5435 5434->5433 5436 4031e8 18 API calls 5435->5436 5437 405908 5436->5437 5438 403198 4 API calls 5437->5438 5439 40591d 5438->5439 5439->5421 5441 4058c4 33 API calls 5440->5441 5442 407e06 5441->5442 5442->5426 6477 405ad4 6478 405adc 6477->6478 6480 405ae4 6477->6480 6479 405aeb 6478->6479 6481 405ae2 6478->6481 6482 405940 19 API calls 6479->6482 6484 405a4c 6481->6484 6482->6480 6485 405a54 6484->6485 6486 405a6e 6485->6486 6487 403154 4 API calls 6485->6487 6488 405a73 6486->6488 6489 405a8a 6486->6489 6487->6485 6490 405940 19 API calls 6488->6490 6491 403154 4 API calls 6489->6491 6492 405a86 6490->6492 6493 405a8f 6491->6493 6495 403154 4 API calls 6492->6495 6494 4059b0 33 API calls 6493->6494 6494->6492 6496 405ab8 6495->6496 6497 403154 4 API calls 6496->6497 6498 405ac6 6497->6498 6498->6480 5910 40a9de 5911 40aa03 5910->5911 5912 407918 InterlockedExchange 5911->5912 5913 40aa2d 5912->5913 5914 409ae8 18 API calls 5913->5914 5915 40aa3d 5913->5915 5914->5915 5920 4076ac SetEndOfFile 5915->5920 5917 40aa59 5918 4025ac 4 API calls 5917->5918 5919 40aa90 5918->5919 5921 4076c3 5920->5921 5922 4076bc 5920->5922 5921->5917 5923 40748c 35 API calls 5922->5923 5923->5921 6841 402be9 RaiseException 6842 402c04 6841->6842 6509 402af2 6510 402afe 6509->6510 6513 402ed0 6510->6513 6514 403154 4 API calls 6513->6514 6516 402ee0 6514->6516 6515 402b03 6516->6515 6518 402b0c 6516->6518 6519 402b25 6518->6519 6520 402b15 RaiseException 6518->6520 6519->6515 6520->6519 5448 40a5f8 5491 4030dc 5448->5491 5450 40a60e 5494 4042e8 5450->5494 5452 40a613 5497 40457c GetModuleHandleA GetProcAddress 5452->5497 5456 40a61d 5505 4065c8 5456->5505 5458 40a622 5514 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5458->5514 5468 40a665 5536 406c2c 5468->5536 5469 4031e8 18 API calls 5470 40a683 5469->5470 5550 4074e0 5470->5550 5476 407918 InterlockedExchange 5479 40a6d2 5476->5479 5477 40a710 5570 4074a0 5477->5570 5479->5477 5607 409ae8 5479->5607 5480 40a751 5574 407a28 5480->5574 5481 40a736 5481->5480 5482 409ae8 18 API calls 5481->5482 5482->5480 5484 40a776 5584 408b08 5484->5584 5488 40a7bc 5489 408b08 35 API calls 5488->5489 5490 40a7f5 5488->5490 5489->5488 5617 403094 5491->5617 5493 4030e1 GetModuleHandleA GetCommandLineA 5493->5450 5495 403154 4 API calls 5494->5495 5496 404323 5494->5496 5495->5496 5496->5452 5498 404598 5497->5498 5499 40459f GetProcAddress 5497->5499 5498->5499 5500 4045b5 GetProcAddress 5499->5500 5501 4045ae 5499->5501 5502 4045c4 SetProcessDEPPolicy 5500->5502 5503 4045c8 5500->5503 5501->5500 5502->5503 5504 404624 6F551CD0 5503->5504 5504->5456 5618 405ca8 5505->5618 5515 4090f7 5514->5515 5702 406fa0 SetErrorMode 5515->5702 5518 407284 19 API calls 5519 409127 5518->5519 5520 403198 4 API calls 5519->5520 5521 40913c 5520->5521 5522 409b78 GetSystemInfo VirtualQuery 5521->5522 5523 409c2c 5522->5523 5526 409ba2 5522->5526 5528 409768 5523->5528 5524 409c0d VirtualQuery 5524->5523 5524->5526 5525 409bcc VirtualProtect 5525->5526 5526->5523 5526->5524 5526->5525 5527 409bfb VirtualProtect 5526->5527 5527->5524 5708 406bd0 GetCommandLineA 5528->5708 5530 409785 5531 409850 5530->5531 5532 406c2c 20 API calls 5530->5532 5535 403454 18 API calls 5530->5535 5533 4031b8 4 API calls 5531->5533 5532->5530 5534 40986a 5533->5534 5534->5468 5600 409c88 5534->5600 5535->5530 5537 406c53 GetModuleFileNameA 5536->5537 5538 406c77 GetCommandLineA 5536->5538 5539 403278 18 API calls 5537->5539 5546 406c7c 5538->5546 5540 406c75 5539->5540 5544 406ca4 5540->5544 5541 406c81 5542 403198 4 API calls 5541->5542 5545 406c89 5542->5545 5543 406af0 18 API calls 5543->5546 5547 403198 4 API calls 5544->5547 5548 40322c 4 API calls 5545->5548 5546->5541 5546->5543 5546->5545 5549 406cb9 5547->5549 5548->5544 5549->5469 5551 4074ea 5550->5551 5715 407576 5551->5715 5718 407578 5551->5718 5552 407516 5553 40752a 5552->5553 5554 40748c 35 API calls 5552->5554 5557 409c34 FindResourceA 5553->5557 5554->5553 5558 409c49 5557->5558 5559 409c4e SizeofResource 5557->5559 5560 409ae8 18 API calls 5558->5560 5561 409c60 LoadResource 5559->5561 5562 409c5b 5559->5562 5560->5559 5564 409c73 LockResource 5561->5564 5565 409c6e 5561->5565 5563 409ae8 18 API calls 5562->5563 5563->5561 5567 409c84 5564->5567 5568 409c7f 5564->5568 5566 409ae8 18 API calls 5565->5566 5566->5564 5567->5476 5567->5479 5569 409ae8 18 API calls 5568->5569 5569->5567 5571 4074b4 5570->5571 5572 4074c4 5571->5572 5573 4073ec 34 API calls 5571->5573 5572->5481 5573->5572 5575 407a35 5574->5575 5576 405890 18 API calls 5575->5576 5577 407a89 5575->5577 5576->5577 5578 407918 InterlockedExchange 5577->5578 5579 407a9b 5578->5579 5580 405890 18 API calls 5579->5580 5581 407ab1 5579->5581 5580->5581 5582 405890 18 API calls 5581->5582 5583 407af4 5581->5583 5582->5583 5583->5484 5597 408b39 5584->5597 5598 408b82 5584->5598 5585 408bcd 5721 407cb8 5585->5721 5586 407cb8 35 API calls 5586->5597 5588 408be4 5591 4031b8 4 API calls 5588->5591 5589 4034f0 18 API calls 5589->5597 5590 4034f0 18 API calls 5590->5598 5593 408bfe 5591->5593 5592 4031e8 18 API calls 5592->5597 5614 404c20 5593->5614 5594 403420 18 API calls 5594->5597 5595 403420 18 API calls 5595->5598 5596 4031e8 18 API calls 5596->5598 5597->5586 5597->5589 5597->5592 5597->5594 5597->5598 5598->5585 5598->5590 5598->5595 5598->5596 5599 407cb8 35 API calls 5598->5599 5599->5598 5601 40322c 4 API calls 5600->5601 5602 409cab 5601->5602 5603 409cba MessageBoxA 5602->5603 5604 409ccf 5603->5604 5605 403198 4 API calls 5604->5605 5606 409cd7 5605->5606 5606->5468 5608 409af1 5607->5608 5609 409b09 5607->5609 5610 405890 18 API calls 5608->5610 5611 405890 18 API calls 5609->5611 5612 409b03 5610->5612 5613 409b1a 5611->5613 5612->5477 5613->5477 5743 402594 5614->5743 5616 404c2b 5616->5488 5617->5493 5619 405940 19 API calls 5618->5619 5620 405cb9 5619->5620 5621 405280 GetSystemDefaultLCID 5620->5621 5624 4052b6 5621->5624 5622 4031e8 18 API calls 5622->5624 5623 404cdc 19 API calls 5623->5624 5624->5622 5624->5623 5625 40520c 19 API calls 5624->5625 5626 405318 5624->5626 5625->5624 5627 404cdc 19 API calls 5626->5627 5628 40520c 19 API calls 5626->5628 5629 4031e8 18 API calls 5626->5629 5630 40539b 5626->5630 5627->5626 5628->5626 5629->5626 5631 4031b8 4 API calls 5630->5631 5632 4053b5 5631->5632 5633 4053c4 GetSystemDefaultLCID 5632->5633 5690 40520c GetLocaleInfoA 5633->5690 5636 4031e8 18 API calls 5637 405404 5636->5637 5638 40520c 19 API calls 5637->5638 5639 405419 5638->5639 5640 40520c 19 API calls 5639->5640 5641 40543d 5640->5641 5696 405258 GetLocaleInfoA 5641->5696 5644 405258 GetLocaleInfoA 5645 40546d 5644->5645 5646 40520c 19 API calls 5645->5646 5647 405487 5646->5647 5648 405258 GetLocaleInfoA 5647->5648 5649 4054a4 5648->5649 5650 40520c 19 API calls 5649->5650 5651 4054be 5650->5651 5652 4031e8 18 API calls 5651->5652 5653 4054cb 5652->5653 5654 40520c 19 API calls 5653->5654 5655 4054e0 5654->5655 5656 4031e8 18 API calls 5655->5656 5657 4054ed 5656->5657 5658 405258 GetLocaleInfoA 5657->5658 5659 4054fb 5658->5659 5660 40520c 19 API calls 5659->5660 5661 405515 5660->5661 5662 4031e8 18 API calls 5661->5662 5663 405522 5662->5663 5664 40520c 19 API calls 5663->5664 5665 405537 5664->5665 5666 4031e8 18 API calls 5665->5666 5667 405544 5666->5667 5668 40520c 19 API calls 5667->5668 5669 405559 5668->5669 5670 405576 5669->5670 5671 405567 5669->5671 5673 40322c 4 API calls 5670->5673 5698 40322c 5671->5698 5674 405574 5673->5674 5675 40520c 19 API calls 5674->5675 5676 405598 5675->5676 5677 4055b5 5676->5677 5678 4055a6 5676->5678 5679 403198 4 API calls 5677->5679 5680 40322c 4 API calls 5678->5680 5681 4055b3 5679->5681 5680->5681 5682 4033b4 18 API calls 5681->5682 5683 4055d7 5682->5683 5684 4033b4 18 API calls 5683->5684 5685 4055f1 5684->5685 5686 4031b8 4 API calls 5685->5686 5687 40560b 5686->5687 5688 405cf4 GetVersionExA 5687->5688 5689 405d0b 5688->5689 5689->5458 5691 405233 5690->5691 5692 405245 5690->5692 5693 403278 18 API calls 5691->5693 5694 40322c 4 API calls 5692->5694 5695 405243 5693->5695 5694->5695 5695->5636 5697 405274 5696->5697 5697->5644 5700 403230 5698->5700 5699 403252 5699->5674 5700->5699 5701 4025ac 4 API calls 5700->5701 5701->5699 5706 403414 5702->5706 5705 406fee 5705->5518 5707 403418 LoadLibraryA 5706->5707 5707->5705 5709 406af0 18 API calls 5708->5709 5710 406bf3 5709->5710 5711 406c05 5710->5711 5712 406af0 18 API calls 5710->5712 5713 403198 4 API calls 5711->5713 5712->5710 5714 406c1a 5713->5714 5714->5530 5716 407578 5715->5716 5717 4075b7 CreateFileA 5716->5717 5717->5552 5719 403414 5718->5719 5720 4075b7 CreateFileA 5719->5720 5720->5552 5722 407cd3 5721->5722 5724 407cc8 5721->5724 5727 407c5c 5722->5727 5724->5588 5726 405890 18 API calls 5726->5724 5728 407c70 5727->5728 5729 407caf 5727->5729 5728->5729 5731 407bac 5728->5731 5729->5724 5729->5726 5732 407bb7 5731->5732 5736 407bc8 5731->5736 5734 405890 18 API calls 5732->5734 5733 4074a0 34 API calls 5735 407bdc 5733->5735 5734->5736 5737 4074a0 34 API calls 5735->5737 5736->5733 5738 407bfd 5737->5738 5739 407918 InterlockedExchange 5738->5739 5740 407c12 5739->5740 5741 407c28 5740->5741 5742 405890 18 API calls 5740->5742 5741->5728 5742->5741 5744 402598 5743->5744 5745 4025a2 5743->5745 5749 401fd4 5744->5749 5745->5616 5745->5745 5746 40259e 5746->5745 5747 403154 4 API calls 5746->5747 5747->5745 5750 401fe8 5749->5750 5751 401fed 5749->5751 5760 401918 RtlInitializeCriticalSection 5750->5760 5753 402012 RtlEnterCriticalSection 5751->5753 5754 40201c 5751->5754 5759 401ff1 5751->5759 5753->5754 5754->5759 5767 401ee0 5754->5767 5757 402147 5757->5746 5758 40213d RtlLeaveCriticalSection 5758->5757 5759->5746 5761 40193c RtlEnterCriticalSection 5760->5761 5762 401946 5760->5762 5761->5762 5763 401964 LocalAlloc 5762->5763 5764 40197e 5763->5764 5765 4019c3 RtlLeaveCriticalSection 5764->5765 5766 4019cd 5764->5766 5765->5766 5766->5751 5770 401ef0 5767->5770 5768 401f1c 5772 401f40 5768->5772 5778 401d00 5768->5778 5770->5768 5770->5772 5773 401e58 5770->5773 5772->5757 5772->5758 5782 4016d8 5773->5782 5776 401e75 5776->5770 5779 401d4e 5778->5779 5780 401d1e 5778->5780 5779->5780 5851 401c68 5779->5851 5780->5772 5785 4016f4 5782->5785 5784 4016fe 5807 4015c4 5784->5807 5785->5784 5787 40175b 5785->5787 5789 40174f 5785->5789 5799 401430 5785->5799 5811 40132c 5785->5811 5787->5776 5792 401dcc 5787->5792 5815 40150c 5789->5815 5790 40170a 5790->5787 5825 401d80 5792->5825 5795 40132c LocalAlloc 5796 401df0 5795->5796 5798 401df8 5796->5798 5829 401b44 5796->5829 5798->5776 5800 40143f VirtualAlloc 5799->5800 5802 40146c 5800->5802 5803 40148f 5800->5803 5819 4012e4 5802->5819 5803->5785 5806 40147c VirtualFree 5806->5803 5809 40160a 5807->5809 5808 40163a 5808->5790 5809->5808 5810 401626 VirtualAlloc 5809->5810 5810->5808 5810->5809 5812 401348 5811->5812 5813 4012e4 LocalAlloc 5812->5813 5814 40138f 5813->5814 5814->5785 5818 40153b 5815->5818 5816 401594 5816->5787 5817 401568 VirtualFree 5817->5818 5818->5816 5818->5817 5822 40128c 5819->5822 5823 401298 LocalAlloc 5822->5823 5824 4012aa 5822->5824 5823->5824 5824->5803 5824->5806 5826 401d89 5825->5826 5828 401d92 5825->5828 5826->5828 5834 401b74 5826->5834 5828->5795 5830 401b61 5829->5830 5831 401b52 5829->5831 5830->5798 5832 401d00 9 API calls 5831->5832 5833 401b5f 5832->5833 5833->5798 5837 40215c 5834->5837 5836 401b95 5836->5828 5838 40217a 5837->5838 5839 402175 5837->5839 5841 4021ab RtlEnterCriticalSection 5838->5841 5842 40217e 5838->5842 5849 4021b5 5838->5849 5840 401918 4 API calls 5839->5840 5840->5838 5841->5849 5842->5836 5843 4021c1 5845 4022e3 RtlLeaveCriticalSection 5843->5845 5846 4022ed 5843->5846 5844 402244 5844->5842 5847 401d80 7 API calls 5844->5847 5845->5846 5846->5836 5847->5842 5848 402270 5848->5843 5850 401d00 7 API calls 5848->5850 5849->5843 5849->5844 5849->5848 5850->5843 5852 401c7a 5851->5852 5853 401c9d 5852->5853 5854 401caf 5852->5854 5864 40188c 5853->5864 5856 40188c 3 API calls 5854->5856 5857 401cad 5856->5857 5858 401b44 9 API calls 5857->5858 5863 401cc5 5857->5863 5859 401cd4 5858->5859 5860 401cee 5859->5860 5874 401b98 5859->5874 5879 4013a0 5860->5879 5863->5780 5865 4018b2 5864->5865 5873 40190b 5864->5873 5883 401658 5865->5883 5868 40132c LocalAlloc 5869 4018cf 5868->5869 5870 40150c VirtualFree 5869->5870 5871 4018e6 5869->5871 5870->5871 5872 4013a0 LocalAlloc 5871->5872 5871->5873 5872->5873 5873->5857 5875 401bab 5874->5875 5876 401b9d 5874->5876 5875->5860 5877 401b74 9 API calls 5876->5877 5878 401baa 5877->5878 5878->5860 5881 4013ab 5879->5881 5880 4013c6 5880->5863 5881->5880 5882 4012e4 LocalAlloc 5881->5882 5882->5880 5885 40168f 5883->5885 5884 4016cf 5884->5868 5885->5884 5886 4016a9 VirtualFree 5885->5886 5886->5885 6843 402dfa 6844 402e0d 6843->6844 6846 402e26 6843->6846 6847 402ba4 6844->6847 6848 402bc9 6847->6848 6849 402bad 6847->6849 6848->6846 6850 402bb5 RaiseException 6849->6850 6850->6848 6851 4075fa GetFileSize 6852 407626 6851->6852 6853 407616 GetLastError 6851->6853 6853->6852 6854 40761f 6853->6854 6855 40748c 35 API calls 6854->6855 6855->6852 6856 406ffb 6857 407008 SetErrorMode 6856->6857 6525 403a80 CloseHandle 6526 403a90 6525->6526 6527 403a91 GetLastError 6525->6527 6528 404283 6529 4042c3 6528->6529 6530 403154 4 API calls 6529->6530 6531 404323 6530->6531 6858 404185 6859 4041ff 6858->6859 6860 4041cc 6859->6860 6861 403154 4 API calls 6859->6861 6862 404323 6861->6862 6532 403e87 6533 403e4c 6532->6533 6534 403e62 6533->6534 6535 403e7b 6533->6535 6538 403e67 6533->6538 6541 403cc8 6534->6541 6537 402674 4 API calls 6535->6537 6539 403e78 6537->6539 6538->6539 6545 402674 6538->6545 6542 403cd6 6541->6542 6543 402674 4 API calls 6542->6543 6544 403ceb 6542->6544 6543->6544 6544->6538 6546 403154 4 API calls 6545->6546 6547 40267a 6546->6547 6547->6539 6556 407e90 6557 407eb8 VirtualFree 6556->6557 6558 407e9d 6557->6558 6561 403e95 6562 403e4c 6561->6562 6563 403e67 6562->6563 6564 403e62 6562->6564 6565 403e7b 6562->6565 6568 403e78 6563->6568 6569 402674 4 API calls 6563->6569 6566 403cc8 4 API calls 6564->6566 6567 402674 4 API calls 6565->6567 6566->6563 6567->6568 6569->6568 6570 40ac97 6579 4096fc 6570->6579 6573 402f24 5 API calls 6574 40aca1 6573->6574 6575 403198 4 API calls 6574->6575 6576 40acc0 6575->6576 6577 403198 4 API calls 6576->6577 6578 40acc8 6577->6578 6588 4056ac 6579->6588 6581 409717 6582 409745 6581->6582 6594 40720c 6581->6594 6585 403198 4 API calls 6582->6585 6584 409735 6587 40973d MessageBoxA 6584->6587 6586 40975a 6585->6586 6586->6573 6586->6574 6587->6582 6589 403154 4 API calls 6588->6589 6590 4056b1 6589->6590 6591 4056c9 6590->6591 6592 403154 4 API calls 6590->6592 6591->6581 6593 4056bf 6592->6593 6593->6581 6595 4056ac 4 API calls 6594->6595 6596 40721b 6595->6596 6597 407221 6596->6597 6598 40722f 6596->6598 6599 40322c 4 API calls 6597->6599 6601 40724b 6598->6601 6602 40723f 6598->6602 6600 40722d 6599->6600 6600->6584 6612 4032b8 6601->6612 6605 4071d0 6602->6605 6606 40322c 4 API calls 6605->6606 6607 4071df 6606->6607 6608 4071fc 6607->6608 6609 406950 CharPrevA 6607->6609 6608->6600 6610 4071eb 6609->6610 6610->6608 6611 4032fc 18 API calls 6610->6611 6611->6608 6613 403278 18 API calls 6612->6613 6614 4032c2 6613->6614 6614->6600 6615 403a97 6616 403aac 6615->6616 6617 403bbc GetStdHandle 6616->6617 6618 403b0e CreateFileA 6616->6618 6627 403ab2 6616->6627 6619 403c17 GetLastError 6617->6619 6632 403bba 6617->6632 6618->6619 6620 403b2c 6618->6620 6619->6627 6622 403b3b GetFileSize 6620->6622 6620->6632 6622->6619 6623 403b4e SetFilePointer 6622->6623 6623->6619 6628 403b6a ReadFile 6623->6628 6624 403be7 GetFileType 6626 403c02 CloseHandle 6624->6626 6624->6627 6626->6627 6628->6619 6629 403b8c 6628->6629 6630 403b9f SetFilePointer 6629->6630 6629->6632 6630->6619 6631 403bb0 SetEndOfFile 6630->6631 6631->6619 6631->6632 6632->6624 6632->6627 6637 40aaa2 6638 40aad2 6637->6638 6639 40aadc CreateWindowExA SetWindowLongA 6638->6639 6640 405194 33 API calls 6639->6640 6641 40ab5f 6640->6641 6642 4032fc 18 API calls 6641->6642 6643 40ab6d 6642->6643 6644 4032fc 18 API calls 6643->6644 6645 40ab7a 6644->6645 6646 406b7c 19 API calls 6645->6646 6647 40ab86 6646->6647 6648 4032fc 18 API calls 6647->6648 6649 40ab8f 6648->6649 6650 4099ec 43 API calls 6649->6650 6651 40aba1 6650->6651 6652 4098cc 19 API calls 6651->6652 6653 40abb4 6651->6653 6652->6653 6654 40abed 6653->6654 6655 4094d8 9 API calls 6653->6655 6656 40ac06 6654->6656 6659 40ac00 RemoveDirectoryA 6654->6659 6655->6654 6657 40ac1a 6656->6657 6658 40ac0f DestroyWindow 6656->6658 6660 40ac42 6657->6660 6661 40357c 4 API calls 6657->6661 6658->6657 6659->6656 6662 40ac38 6661->6662 6663 4025ac 4 API calls 6662->6663 6663->6660 6875 405ba2 6877 405ba4 6875->6877 6876 405be0 6880 405940 19 API calls 6876->6880 6877->6876 6878 405bf7 6877->6878 6879 405bda 6877->6879 6884 404cdc 19 API calls 6878->6884 6879->6876 6881 405c4c 6879->6881 6882 405bf3 6880->6882 6883 4059b0 33 API calls 6881->6883 6885 403198 4 API calls 6882->6885 6883->6882 6886 405c20 6884->6886 6887 405c86 6885->6887 6888 4059b0 33 API calls 6886->6888 6888->6882 6889 408da4 6890 408dc8 6889->6890 6891 408c80 18 API calls 6890->6891 6892 408dd1 6891->6892 6664 402caa 6665 403154 4 API calls 6664->6665 6666 402caf 6665->6666 6907 4011aa 6908 4011ac GetStdHandle 6907->6908 6667 4028ac 6668 402594 18 API calls 6667->6668 6669 4028b6 6668->6669 4979 40aab4 4980 40aab8 SetLastError 4979->4980 5011 409648 GetLastError 4980->5011 4983 40aad2 4985 40aadc CreateWindowExA SetWindowLongA 4983->4985 5024 405194 4985->5024 4989 40ab6d 4990 4032fc 18 API calls 4989->4990 4991 40ab7a 4990->4991 5041 406b7c GetCommandLineA 4991->5041 4994 4032fc 18 API calls 4995 40ab8f 4994->4995 5046 4099ec 4995->5046 4997 40aba1 4999 40abb4 4997->4999 5067 4098cc 4997->5067 5000 40abd4 4999->5000 5001 40abed 4999->5001 5073 4094d8 5000->5073 5003 40ac06 5001->5003 5006 40ac00 RemoveDirectoryA 5001->5006 5004 40ac1a 5003->5004 5005 40ac0f DestroyWindow 5003->5005 5007 40ac42 5004->5007 5081 40357c 5004->5081 5005->5004 5006->5003 5009 40ac38 5094 4025ac 5009->5094 5098 404c94 5011->5098 5019 4096c3 5113 4031b8 5019->5113 5025 4051a8 33 API calls 5024->5025 5026 4051a3 5025->5026 5027 4032fc 5026->5027 5028 403300 5027->5028 5029 40333f 5027->5029 5030 4031e8 5028->5030 5031 40330a 5028->5031 5029->4989 5037 403254 18 API calls 5030->5037 5038 4031fc 5030->5038 5032 403334 5031->5032 5033 40331d 5031->5033 5036 4034f0 18 API calls 5032->5036 5274 4034f0 5033->5274 5034 403228 5034->4989 5040 403322 5036->5040 5037->5038 5038->5034 5039 4025ac 4 API calls 5038->5039 5039->5034 5040->4989 5300 406af0 5041->5300 5043 406ba1 5044 403198 4 API calls 5043->5044 5045 406bbf 5044->5045 5045->4994 5314 4033b4 5046->5314 5048 409a27 5049 409a59 CreateProcessA 5048->5049 5050 409a65 5049->5050 5051 409a6c CloseHandle 5049->5051 5052 409648 35 API calls 5050->5052 5053 409a75 5051->5053 5052->5051 5054 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5053->5054 5055 409a7a MsgWaitForMultipleObjects 5054->5055 5055->5053 5056 409a91 5055->5056 5057 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5056->5057 5058 409a96 GetExitCodeProcess CloseHandle 5057->5058 5059 409ab6 5058->5059 5060 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5059->5060 5061 409abe 5060->5061 5061->4997 5062 402f24 5063 403154 4 API calls 5062->5063 5064 402f29 5063->5064 5320 402bcc 5064->5320 5066 402f51 5066->5066 5068 40990e 5067->5068 5069 4098d4 5067->5069 5068->4999 5069->5068 5070 403420 18 API calls 5069->5070 5071 409908 5070->5071 5323 408e80 5071->5323 5074 409532 5073->5074 5078 4094eb 5073->5078 5074->5001 5075 4094f3 Sleep 5075->5078 5076 409503 Sleep 5076->5078 5078->5074 5078->5075 5078->5076 5079 40951a GetLastError 5078->5079 5346 408fbc 5078->5346 5079->5074 5080 409524 GetLastError 5079->5080 5080->5074 5080->5078 5084 403591 5081->5084 5090 4035a0 5081->5090 5082 4035b1 5085 403198 4 API calls 5082->5085 5083 4035b8 5086 4031b8 4 API calls 5083->5086 5087 4035d0 5084->5087 5088 40359b 5084->5088 5089 4035b6 5084->5089 5085->5089 5086->5089 5087->5089 5092 40357c 4 API calls 5087->5092 5088->5090 5091 4035ec 5088->5091 5089->5009 5090->5082 5090->5083 5091->5089 5363 403554 5091->5363 5092->5087 5095 4025b0 5094->5095 5096 4025ba 5094->5096 5095->5096 5097 403154 4 API calls 5095->5097 5096->5007 5096->5096 5097->5096 5121 4051a8 5098->5121 5101 407284 FormatMessageA 5102 4072aa 5101->5102 5103 403278 18 API calls 5102->5103 5104 4072c7 5103->5104 5105 408da8 5104->5105 5106 408dc8 5105->5106 5264 408c80 5106->5264 5109 405890 5110 405897 5109->5110 5111 4031e8 18 API calls 5110->5111 5112 4058af 5111->5112 5112->5019 5115 4031be 5113->5115 5114 4031e3 5117 403198 5114->5117 5115->5114 5116 4025ac 4 API calls 5115->5116 5116->5115 5118 4031b7 5117->5118 5119 40319e 5117->5119 5118->4983 5118->5062 5119->5118 5120 4025ac 4 API calls 5119->5120 5120->5118 5122 4051c5 5121->5122 5129 404e58 5122->5129 5125 4051f1 5134 403278 5125->5134 5132 404e73 5129->5132 5130 404e85 5130->5125 5139 404be4 5130->5139 5132->5130 5142 404f7a 5132->5142 5149 404e4c 5132->5149 5135 403254 18 API calls 5134->5135 5136 403288 5135->5136 5137 403198 4 API calls 5136->5137 5138 4032a0 5137->5138 5138->5101 5256 405940 5139->5256 5141 404bf5 5141->5125 5143 404f8b 5142->5143 5147 404fd9 5142->5147 5146 40505f 5143->5146 5143->5147 5145 404ff7 5145->5132 5146->5145 5156 404e38 5146->5156 5147->5145 5152 404df4 5147->5152 5150 403198 4 API calls 5149->5150 5151 404e56 5150->5151 5151->5132 5153 404e02 5152->5153 5159 404bfc 5153->5159 5155 404e30 5155->5147 5186 4039a4 5156->5186 5162 4059b0 5159->5162 5161 404c15 5161->5155 5163 4059be 5162->5163 5172 404cdc LoadStringA 5163->5172 5166 405194 33 API calls 5167 4059f6 5166->5167 5175 4031e8 5167->5175 5170 4031b8 4 API calls 5171 405a1b 5170->5171 5171->5161 5173 403278 18 API calls 5172->5173 5174 404d09 5173->5174 5174->5166 5176 4031ec 5175->5176 5179 4031fc 5175->5179 5176->5179 5181 403254 5176->5181 5177 403228 5177->5170 5179->5177 5180 4025ac 4 API calls 5179->5180 5180->5177 5182 403274 5181->5182 5183 403258 5181->5183 5182->5179 5184 402594 18 API calls 5183->5184 5185 403261 5184->5185 5185->5179 5187 4039ab 5186->5187 5192 4038b4 5187->5192 5189 4039cb 5190 403198 4 API calls 5189->5190 5191 4039d2 5190->5191 5191->5145 5193 4038d5 5192->5193 5194 4038c8 5192->5194 5196 403934 5193->5196 5197 4038db 5193->5197 5220 403780 5194->5220 5198 403993 5196->5198 5199 40393b 5196->5199 5200 4038e1 5197->5200 5201 4038ee 5197->5201 5202 4037f4 3 API calls 5198->5202 5203 403941 5199->5203 5204 40394b 5199->5204 5227 403894 5200->5227 5206 403894 6 API calls 5201->5206 5209 4038d0 5202->5209 5242 403864 5203->5242 5208 4037f4 3 API calls 5204->5208 5210 4038fc 5206->5210 5211 40395d 5208->5211 5209->5189 5232 4037f4 5210->5232 5214 403864 23 API calls 5211->5214 5213 403917 5238 40374c 5213->5238 5215 403976 5214->5215 5218 40374c VariantClear 5215->5218 5217 40392c 5217->5189 5219 40398b 5218->5219 5219->5189 5221 4037f0 5220->5221 5223 403744 5220->5223 5221->5209 5222 403793 VariantClear 5222->5223 5223->5220 5223->5222 5224 4037ab 5223->5224 5225 403198 4 API calls 5223->5225 5226 4037dc VariantCopyInd 5223->5226 5224->5209 5225->5223 5226->5221 5226->5223 5247 4036b8 5227->5247 5230 40374c VariantClear 5231 4038a9 5230->5231 5231->5209 5233 403845 VariantChangeTypeEx 5232->5233 5234 40380a VariantChangeTypeEx 5232->5234 5237 403832 5233->5237 5235 403826 5234->5235 5236 40374c VariantClear 5235->5236 5236->5237 5237->5213 5239 403759 5238->5239 5240 403766 5238->5240 5239->5240 5241 403779 VariantClear 5239->5241 5240->5217 5241->5217 5253 40369c SysStringLen 5242->5253 5245 40374c VariantClear 5246 403882 5245->5246 5246->5209 5248 4036cb 5247->5248 5249 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5248->5249 5250 4036db 5248->5250 5251 40372e 5249->5251 5252 4036ed MultiByteToWideChar SysAllocStringLen 5250->5252 5251->5230 5252->5251 5254 403610 21 API calls 5253->5254 5255 4036b3 5254->5255 5255->5245 5257 40594c 5256->5257 5258 404cdc 19 API calls 5257->5258 5259 405972 5258->5259 5260 4031e8 18 API calls 5259->5260 5261 40597d 5260->5261 5262 403198 4 API calls 5261->5262 5263 405992 5262->5263 5263->5141 5265 403198 4 API calls 5264->5265 5267 408cb1 5264->5267 5265->5267 5266 4031b8 4 API calls 5268 408d69 5266->5268 5269 408cc8 5267->5269 5270 403278 18 API calls 5267->5270 5272 408cdc 5267->5272 5273 4032fc 18 API calls 5267->5273 5268->5109 5271 4032fc 18 API calls 5269->5271 5270->5267 5271->5272 5272->5266 5273->5267 5275 4034fd 5274->5275 5282 40352d 5274->5282 5277 403526 5275->5277 5280 403509 5275->5280 5276 403198 4 API calls 5279 403517 5276->5279 5278 403254 18 API calls 5277->5278 5278->5282 5279->5040 5283 4025c4 5280->5283 5282->5276 5285 4025ca 5283->5285 5284 4025dc 5284->5279 5284->5284 5285->5284 5287 403154 5285->5287 5288 403164 5287->5288 5289 40318c TlsGetValue 5287->5289 5288->5284 5290 403196 5289->5290 5291 40316f 5289->5291 5290->5284 5295 40310c 5291->5295 5293 403174 TlsGetValue 5294 403184 5293->5294 5294->5284 5296 403120 LocalAlloc 5295->5296 5297 403116 5295->5297 5298 40313e TlsSetValue 5296->5298 5299 403132 5296->5299 5297->5296 5298->5299 5299->5293 5301 406b1c 5300->5301 5302 403278 18 API calls 5301->5302 5303 406b29 5302->5303 5310 403420 5303->5310 5305 406b31 5306 4031e8 18 API calls 5305->5306 5307 406b49 5306->5307 5308 403198 4 API calls 5307->5308 5309 406b6b 5308->5309 5309->5043 5311 403426 5310->5311 5313 403437 5310->5313 5312 403254 18 API calls 5311->5312 5311->5313 5312->5313 5313->5305 5315 4033bc 5314->5315 5316 403254 18 API calls 5315->5316 5317 4033cf 5316->5317 5318 4031e8 18 API calls 5317->5318 5319 4033f7 5318->5319 5321 402bd5 RaiseException 5320->5321 5322 402be6 5320->5322 5321->5322 5322->5066 5324 408e8e 5323->5324 5326 408ea6 5324->5326 5336 408e18 5324->5336 5327 408e18 18 API calls 5326->5327 5328 408eca 5326->5328 5327->5328 5339 407918 5328->5339 5330 408ee5 5331 408e18 18 API calls 5330->5331 5333 408ef8 5330->5333 5331->5333 5332 408e18 18 API calls 5332->5333 5333->5332 5334 403278 18 API calls 5333->5334 5335 408f27 5333->5335 5334->5333 5335->5068 5337 405890 18 API calls 5336->5337 5338 408e29 5337->5338 5338->5326 5342 4078c4 5339->5342 5343 4078d6 5342->5343 5344 4078e7 5342->5344 5345 4078db InterlockedExchange 5343->5345 5344->5330 5345->5344 5354 408f70 5346->5354 5348 408fd2 5349 408fd6 5348->5349 5350 408ff2 DeleteFileA GetLastError 5348->5350 5349->5078 5351 409010 5350->5351 5360 408fac 5351->5360 5355 408f7a 5354->5355 5356 408f7e 5354->5356 5355->5348 5357 408fa0 SetLastError 5356->5357 5358 408f87 Wow64DisableWow64FsRedirection 5356->5358 5359 408f9b 5357->5359 5358->5359 5359->5348 5361 408fb1 Wow64RevertWow64FsRedirection 5360->5361 5362 408fbb 5360->5362 5361->5362 5362->5078 5364 403566 5363->5364 5366 403578 5364->5366 5367 403604 5364->5367 5366->5091 5368 40357c 5367->5368 5373 40359b 5368->5373 5374 4035b6 5368->5374 5375 4035d0 5368->5375 5376 4035a0 5368->5376 5369 4035b1 5371 403198 4 API calls 5369->5371 5370 4035b8 5372 4031b8 4 API calls 5370->5372 5371->5374 5372->5374 5373->5376 5377 4035ec 5373->5377 5374->5364 5375->5374 5378 40357c 4 API calls 5375->5378 5376->5369 5376->5370 5377->5374 5379 403554 4 API calls 5377->5379 5378->5375 5379->5377 6670 401ab9 6671 401a96 6670->6671 6672 401aa9 RtlDeleteCriticalSection 6671->6672 6673 401a9f RtlLeaveCriticalSection 6671->6673 6673->6672

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 132 409b78-409b9c GetSystemInfo VirtualQuery 133 409ba2 132->133 134 409c2c-409c33 132->134 135 409c21-409c26 133->135 135->134 136 409ba4-409bab 135->136 137 409c0d-409c1f VirtualQuery 136->137 138 409bad-409bb1 136->138 137->134 137->135 138->137 139 409bb3-409bbb 138->139 140 409bcc-409bdd VirtualProtect 139->140 141 409bbd-409bc0 139->141 143 409be1-409be3 140->143 144 409bdf 140->144 141->140 142 409bc2-409bc5 141->142 142->140 145 409bc7-409bca 142->145 146 409bf2-409bf5 143->146 144->143 145->140 145->143 147 409be5-409bee call 409b70 146->147 148 409bf7-409bf9 146->148 147->146 148->137 150 409bfb-409c08 VirtualProtect 148->150 150->137
                                                                                                                    APIs
                                                                                                                    • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                                                                    • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                                                                    • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                                                                    • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2441996862-0
                                                                                                                    • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                                                    • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                                                                    • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                                                    • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                                                                    APIs
                                                                                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2299586839-0
                                                                                                                    • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                                                    • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                                                                    • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                                                    • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                                                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                                                    • API String ID: 3256987805-3653653586
                                                                                                                    • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                                                    • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                                                    • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                                                    • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • SetLastError.KERNEL32 ref: 0040AAC1
                                                                                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,021B1E08), ref: 0040966C
                                                                                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                                                    • SetWindowLongA.USER32(0002046A,000000FC,00409960), ref: 0040AB15
                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                                                    • DestroyWindow.USER32(0002046A,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                                                    • API String ID: 3757039580-3001827809
                                                                                                                    • Opcode ID: 512ba3d6f2e9f1c3867d88fe9cc8f5790ae5845b184f1ae6f41adfa2939ac233
                                                                                                                    • Instruction ID: be79b44adbed8f80b53e5612ba2c07cab25871a7655baedeeb07d74425ea1546
                                                                                                                    • Opcode Fuzzy Hash: 512ba3d6f2e9f1c3867d88fe9cc8f5790ae5845b184f1ae6f41adfa2939ac233
                                                                                                                    • Instruction Fuzzy Hash: 83410070604204DBDB10EBA9EE89B9D37A5EB49304F10467FF114B72E2D7B89845CB9D

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                                                    • API String ID: 1646373207-2130885113
                                                                                                                    • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                                                    • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                                                                    • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                                                    • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                                                    • SetWindowLongA.USER32(0002046A,000000FC,00409960), ref: 0040AB15
                                                                                                                      • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                                                                      • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1E08,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                                                      • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1E08,00409AD8,00000000), ref: 00409A70
                                                                                                                      • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                                                      • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                                                      • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1E08,00409AD8), ref: 00409AA4
                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                                                    • DestroyWindow.USER32(0002046A,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                                                    • API String ID: 3586484885-3001827809
                                                                                                                    • Opcode ID: abbbb59459200108d21b408613378a390e3e047840070f8330146cd7c6fc736f
                                                                                                                    • Instruction ID: 3ba592a6bb5a586105fd12ff7794ab8e81bfb13978b6693ff680cbbbd79f3ebd
                                                                                                                    • Opcode Fuzzy Hash: abbbb59459200108d21b408613378a390e3e047840070f8330146cd7c6fc736f
                                                                                                                    • Instruction Fuzzy Hash: EF410B71604204DFD714EBA9EE89B5A37B5EB48314F20467BF104BB2E1D7B8A844CB9D

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1E08,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                                                    • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1E08,00409AD8,00000000), ref: 00409A70
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                                                    • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,021B1E08,00409AD8), ref: 00409AA4
                                                                                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,021B1E08), ref: 0040966C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                                                    • String ID: D
                                                                                                                    • API String ID: 3356880605-2746444292
                                                                                                                    • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                                                    • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                                                                    • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                                                    • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 116 401918-40193a RtlInitializeCriticalSection 117 401946-40197c call 4012dc * 3 LocalAlloc 116->117 118 40193c-401941 RtlEnterCriticalSection 116->118 125 4019ad-4019c1 117->125 126 40197e 117->126 118->117 129 4019c3-4019c8 RtlLeaveCriticalSection 125->129 130 4019cd 125->130 128 401983-401995 126->128 128->128 131 401997-4019a6 128->131 129->130 131->125
                                                                                                                    APIs
                                                                                                                    • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                                                    • String ID: tWf
                                                                                                                    • API String ID: 730355536-4254209632
                                                                                                                    • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                                                    • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                                                    • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                                                    • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message
                                                                                                                    • String ID: .tmp$y@
                                                                                                                    • API String ID: 2030045667-2396523267
                                                                                                                    • Opcode ID: d4ac7463dbf5d161e361ca9bc326db0ca40d9a64499bf0d63171a4d21a2c3052
                                                                                                                    • Instruction ID: b6b31011a0dd284aafbaa2c2e49cce084e53b2f1e69b481334740b61ed9710c2
                                                                                                                    • Opcode Fuzzy Hash: d4ac7463dbf5d161e361ca9bc326db0ca40d9a64499bf0d63171a4d21a2c3052
                                                                                                                    • Instruction Fuzzy Hash: DA41A171704200DFD715EF65EED1A1A77A5E749304B61853AF804B73E1C679AC10CBAD

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message
                                                                                                                    • String ID: .tmp$y@
                                                                                                                    • API String ID: 2030045667-2396523267
                                                                                                                    • Opcode ID: 0c9aecb76b7a3e7a11760fd8a915a701fd69e196c0d41de26bbb48f3063f32c7
                                                                                                                    • Instruction ID: ebe7ed5bd99e4afc73068d402fc5cc7c846ae42ea211bad011db29787866ec42
                                                                                                                    • Opcode Fuzzy Hash: 0c9aecb76b7a3e7a11760fd8a915a701fd69e196c0d41de26bbb48f3063f32c7
                                                                                                                    • Instruction Fuzzy Hash: 4B41A070700200DFC711EF65DED6A5A77A5EB49304B61463AF804B73E2CAB9AC10CBAD

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                    • String ID: .tmp
                                                                                                                    • API String ID: 1375471231-2986845003
                                                                                                                    • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                                                    • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                                                                    • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                                                    • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 345 4076e8-4076ea call 40748c 343->345 346 4076ef-4076f2 343->346 347 407770-407785 344->347 345->346 349 407700-407704 346->349 350 4076f4-4076fb call 4073ec 346->350 351 407787 347->351 352 4077f9 347->352 350->349 353 40778a-40778f 351->353 354 4077fd-407802 351->354 355 40783b-40783d 352->355 356 4077fb 352->356 359 407803-407819 353->359 361 407791-407792 353->361 354->359 360 407841-407843 355->360 356->354 362 40785b-40785c 359->362 370 40781b 359->370 360->362 365 407724-407741 361->365 366 407794-4077b4 361->366 363 4078d6-4078eb call 407890 InterlockedExchange 362->363 364 40785e-40788c 362->364 387 407912-407917 363->387 388 4078ed-407910 363->388 380 407820-407823 364->380 381 407890-407893 364->381 369 4077b5 365->369 372 407743 365->372 366->369 374 4077b6-4077b7 369->374 375 4077f7-4077f8 369->375 376 40781e-40781f 370->376 378 407746-407747 372->378 379 4077b9 372->379 374->379 375->352 376->380 378->342 382 4077bb-4077cd 378->382 379->382 384 407824 380->384 385 407898 380->385 381->385 382->360 386 4077cf-4077d4 382->386 389 407825 384->389 390 40789a 384->390 385->390 386->355 394 4077d6-4077de 386->394 388->387 388->388 392 407896-407897 389->392 393 407826-40782d 389->393 395 40789f 390->395 392->385 396 4078a1 393->396 397 40782f 393->397 394->347 405 4077e0 394->405 395->396 402 4078a3 396->402 403 4078ac 396->403 399 407832-407833 397->399 400 4078a5-4078aa 397->400 399->355 399->376 404 4078ae-4078af 400->404 402->400 403->404 404->395 406 4078b1-4078bd 404->406 405->375 406->385 407 4078bf-4078c0 406->407
                                                                                                                    APIs
                                                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3934441357-0
                                                                                                                    • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                                                    • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                                                                    • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                                                    • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 414 401fed-401fef 409->414 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 415 402027 413->415 416 40202c-402032 413->416 414->410 417 401ff1-401ff6 414->417 415->416 418 402038-40203c 416->418 419 4020cb-4020d1 416->419 420 40214f-402158 417->420 423 402041-402050 418->423 424 40203e 418->424 421 4020d3-4020e0 419->421 422 40211d-40211f call 401ee0 419->422 425 4020e2-4020ea 421->425 426 4020ef-40211b call 402f54 421->426 432 402124-40213b 422->432 423->419 427 402052-402060 423->427 424->423 425->426 426->420 430 402062-402066 427->430 431 40207c-402080 427->431 437 402068 430->437 438 40206b-40207a 430->438 434 402082 431->434 435 402085-4020a0 431->435 440 402147 432->440 441 40213d-402142 RtlLeaveCriticalSection 432->441 434->435 439 4020a2-4020c6 call 402f54 435->439 437->438 438->439 439->420 441->440
                                                                                                                    APIs
                                                                                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                                                                      • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                                                      • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                                                      • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                                                      • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 296031713-0
                                                                                                                    • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                                                    • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                                                                    • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                                                    • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                                                    • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLibraryLoadMode
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2987862817-0
                                                                                                                    • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                                                    • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                                                    • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                                                    • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1156039329-0
                                                                                                                    • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                                                    • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                                                    • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                                                    • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                                                                                    APIs
                                                                                                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                                                    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLastRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1948546556-0
                                                                                                                    • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                                                    • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                                                    • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                                                    • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                                                    • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1156039329-0
                                                                                                                    • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                                                    • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                                                    • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                                                    • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                                                    APIs
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Virtual$AllocFree
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2087232378-0
                                                                                                                    • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                                                    • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                                                    • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                                                    • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                                                    APIs
                                                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                                                                      • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                                                                      • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1658689577-0
                                                                                                                    • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                                                    • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                                                                    • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                                                    • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                                                    • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                                                    • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                                                    • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                                                    • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                                                    • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                                                    • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3188754299-0
                                                                                                                    • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                                                    • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                                                    • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                                                    • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                                                    APIs
                                                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLastWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 442123175-0
                                                                                                                    • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                                                    • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                                                    • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                                                    • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                                                    APIs
                                                                                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FormatMessage
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1306739567-0
                                                                                                                    • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                                                    • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                                                    • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                                                    • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                                                    APIs
                                                                                                                    • SetEndOfFile.KERNEL32(?,021C8000,0040AA59,00000000), ref: 004076B3
                                                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,021B03AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 734332943-0
                                                                                                                    • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                                                    • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                                                    • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                                                    • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorMode
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2340568224-0
                                                                                                                    • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                                                    • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                                                    • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                                                    • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorMode
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2340568224-0
                                                                                                                    • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                                                    • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                                                    • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                                                    • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                                                    APIs
                                                                                                                    • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CharPrev
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 122130370-0
                                                                                                                    • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                                                    • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                                                    • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    APIs
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4275171209-0
                                                                                                                    • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                                                    • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                                                                    • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                                                    • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                                                                    APIs
                                                                                                                    • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1263568516-0
                                                                                                                    • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                                                    • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                                                    • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                                                    • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2962429428-0
                                                                                                                    • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                                                    • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                                                    • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                                                    • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                                                    APIs
                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1263568516-0
                                                                                                                    • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                                                    • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                                                    • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                                                    • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                                    • String ID: SeShutdownPrivilege
                                                                                                                    • API String ID: 107509674-3733053543
                                                                                                                    • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                                                    • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                                                    • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                                                    • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                                                    APIs
                                                                                                                    • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                                                                    • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                                                                    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3473537107-0
                                                                                                                    • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                                                    • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                                                                    • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                                                    • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                                                                    APIs
                                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2299586839-0
                                                                                                                    • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                                                    • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                                                                    • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                                                    • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                                                                    APIs
                                                                                                                    • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: SystemTime
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2656138-0
                                                                                                                    • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                                                    • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                                                    • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                                                    • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                                                    APIs
                                                                                                                    • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Version
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1889659487-0
                                                                                                                    • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                                                    • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                                                                    • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                                                    • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                                                    • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                                                    • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                                                    • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressCloseHandleModuleProc
                                                                                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                                                    • API String ID: 4190037839-2401316094
                                                                                                                    • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                                                    • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                                                    • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                                                    • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                                                    • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1694776339-0
                                                                                                                    • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                                                    • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                                                    • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                                                    • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                                                    APIs
                                                                                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                                                    • LocalFree.KERNEL32(00664180,00000000,00401AB4), ref: 00401A1B
                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,00664180,00000000,00401AB4), ref: 00401A3A
                                                                                                                    • LocalFree.KERNEL32(00665180,?,00000000,00008000,00664180,00000000,00401AB4), ref: 00401A79
                                                                                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                                                    • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                                                    • String ID: tWf
                                                                                                                    • API String ID: 3782394904-4254209632
                                                                                                                    • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                                                    • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                                                    • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                                                    • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                                                    APIs
                                                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                                                                      • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                                                      • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale$DefaultSystem
                                                                                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                                                    • API String ID: 1044490935-665933166
                                                                                                                    • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                                                    • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                                                                    • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                                                    • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                                                                    APIs
                                                                                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                                                    • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExitMessageProcess
                                                                                                                    • String ID: Error$Runtime error at 00000000$9@
                                                                                                                    • API String ID: 1220098344-1503883590
                                                                                                                    • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                                                    • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                                                    • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                                                    • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 262959230-0
                                                                                                                    • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                                                    • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                                                    • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                                                    • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                                                    APIs
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: QueryValue
                                                                                                                    • String ID: )q@
                                                                                                                    • API String ID: 3660427363-2284170586
                                                                                                                    • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                                                    • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                                                                    • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                                                    • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                                                                    APIs
                                                                                                                    • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                                                                    Strings
                                                                                                                    • Setup, xrefs: 00409CAD
                                                                                                                    • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message
                                                                                                                    • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                                                                    • API String ID: 2030045667-3271211647
                                                                                                                    • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                                                    • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                                                                    • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                                                    • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                                                                    • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CommandHandleLineModule
                                                                                                                    • String ID: U1hd.@
                                                                                                                    • API String ID: 2123368496-2904493091
                                                                                                                    • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                                                    • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                                                    • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                                                    • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000002.2949641667.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000000.00000002.2949625693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949663589.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    • Associated: 00000000.00000002.2949678398.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastSleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1458359878-0
                                                                                                                    • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                                                    • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                                                    • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                                                    • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:15.9%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:4.2%
                                                                                                                    Total number of Nodes:2000
                                                                                                                    Total number of Limit Nodes:63
                                                                                                                    execution_graph 50019 40cc44 50022 406f20 WriteFile 50019->50022 50023 406f3d 50022->50023 50024 402584 50025 402598 50024->50025 50026 4025ab 50024->50026 50054 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50025->50054 50028 4025c2 RtlEnterCriticalSection 50026->50028 50029 4025cc 50026->50029 50028->50029 50040 4023b4 13 API calls 50029->50040 50031 40259d 50031->50026 50032 4025a1 50031->50032 50033 4025d9 50036 402635 50033->50036 50037 40262b RtlLeaveCriticalSection 50033->50037 50034 4025d5 50034->50033 50041 402088 50034->50041 50037->50036 50038 4025e5 50038->50033 50055 402210 9 API calls 50038->50055 50040->50034 50042 40209c 50041->50042 50043 4020af 50041->50043 50062 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50042->50062 50045 4020c6 RtlEnterCriticalSection 50043->50045 50048 4020d0 50043->50048 50045->50048 50046 4020a1 50046->50043 50047 4020a5 50046->50047 50051 402106 50047->50051 50048->50051 50056 401f94 50048->50056 50051->50038 50052 4021f1 RtlLeaveCriticalSection 50053 4021fb 50052->50053 50053->50038 50054->50031 50055->50033 50057 401fa4 50056->50057 50058 401fd0 50057->50058 50061 401ff4 50057->50061 50063 401f0c 50057->50063 50058->50061 50068 401db4 50058->50068 50061->50052 50061->50053 50062->50046 50072 40178c 50063->50072 50066 401f29 50066->50057 50069 401dd2 50068->50069 50070 401e02 50068->50070 50069->50061 50070->50069 50100 401d1c 50070->50100 50075 4017a8 50072->50075 50074 4017b2 50091 401678 VirtualAlloc 50074->50091 50075->50074 50077 40180f 50075->50077 50080 401803 50075->50080 50083 4014e4 50075->50083 50092 4013e0 LocalAlloc 50075->50092 50077->50066 50082 401e80 9 API calls 50077->50082 50079 4017be 50079->50077 50093 4015c0 VirtualFree 50080->50093 50082->50066 50084 4014f3 VirtualAlloc 50083->50084 50086 401520 50084->50086 50087 401543 50084->50087 50094 401398 50086->50094 50087->50075 50090 401530 VirtualFree 50090->50087 50091->50079 50092->50075 50093->50077 50097 401340 50094->50097 50098 40134c LocalAlloc 50097->50098 50099 40135e 50097->50099 50098->50099 50099->50087 50099->50090 50101 401d2e 50100->50101 50102 401d51 50101->50102 50103 401d63 50101->50103 50113 401940 50102->50113 50105 401940 3 API calls 50103->50105 50106 401d61 50105->50106 50107 401d79 50106->50107 50123 401bf8 9 API calls 50106->50123 50107->50069 50109 401d88 50110 401da2 50109->50110 50124 401c4c 9 API calls 50109->50124 50125 401454 LocalAlloc 50110->50125 50114 401966 50113->50114 50122 4019bf 50113->50122 50126 40170c 50114->50126 50118 401983 50120 40199a 50118->50120 50131 4015c0 VirtualFree 50118->50131 50120->50122 50132 401454 LocalAlloc 50120->50132 50122->50106 50123->50109 50124->50110 50125->50107 50129 401743 50126->50129 50127 401783 50130 4013e0 LocalAlloc 50127->50130 50128 40175d VirtualFree 50128->50129 50129->50127 50129->50128 50130->50118 50131->50120 50132->50122 50133 499280 50191 403344 50133->50191 50135 49928e 50194 4056a0 50135->50194 50137 499293 50197 40632c GetModuleHandleA GetProcAddress 50137->50197 50141 49929d 50205 40995c 50141->50205 50472 4032fc 50191->50472 50193 403349 GetModuleHandleA GetCommandLineA 50193->50135 50196 4056db 50194->50196 50473 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50194->50473 50196->50137 50198 406348 50197->50198 50199 40634f GetProcAddress 50197->50199 50198->50199 50200 406365 GetProcAddress 50199->50200 50201 40635e 50199->50201 50202 406374 SetProcessDEPPolicy 50200->50202 50203 406378 50200->50203 50201->50200 50202->50203 50204 4063d4 6F551CD0 50203->50204 50204->50141 50474 409034 50205->50474 50472->50193 50473->50196 50546 408ccc 50474->50546 50477 4085ec GetSystemDefaultLCID 50480 408622 50477->50480 50478 406dfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50478->50480 50479 408578 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 50479->50480 50480->50478 50480->50479 50481 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50480->50481 50485 408684 50480->50485 50481->50480 50482 406dfc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50482->50485 50483 408578 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 50483->50485 50484 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50484->50485 50485->50482 50485->50483 50485->50484 50486 408707 50485->50486 50587 403420 50486->50587 50489 408730 GetSystemDefaultLCID 50591 408578 GetLocaleInfoA 50489->50591 50492 403450 4 API calls 50493 408770 50492->50493 50494 408578 5 API calls 50493->50494 50495 408785 50494->50495 50496 408578 5 API calls 50495->50496 50497 4087a9 50496->50497 50597 4085c4 GetLocaleInfoA 50497->50597 50500 4085c4 GetLocaleInfoA 50501 4087d9 50500->50501 50502 408578 5 API calls 50501->50502 50503 4087f3 50502->50503 50504 4085c4 GetLocaleInfoA 50503->50504 50505 408810 50504->50505 50506 408578 5 API calls 50505->50506 50507 40882a 50506->50507 50508 403450 4 API calls 50507->50508 50509 408837 50508->50509 50510 408578 5 API calls 50509->50510 50511 40884c 50510->50511 50512 403450 4 API calls 50511->50512 50513 408859 50512->50513 50514 4085c4 GetLocaleInfoA 50513->50514 50515 408867 50514->50515 50516 408578 5 API calls 50515->50516 50517 408881 50516->50517 50518 403450 4 API calls 50517->50518 50519 40888e 50518->50519 50520 408578 5 API calls 50519->50520 50521 4088a3 50520->50521 50522 403450 4 API calls 50521->50522 50523 4088b0 50522->50523 50524 408578 5 API calls 50523->50524 50525 4088c5 50524->50525 50526 4088e2 50525->50526 50527 4088d3 50525->50527 50529 403494 4 API calls 50526->50529 50605 403494 50527->50605 50530 4088e0 50529->50530 50531 408578 5 API calls 50530->50531 50532 408904 50531->50532 50533 408921 50532->50533 50534 408912 50532->50534 50536 403400 4 API calls 50533->50536 50535 403494 4 API calls 50534->50535 50547 408cd8 50546->50547 50554 406dfc LoadStringA 50547->50554 50567 4034e0 50554->50567 50557 403450 50558 403454 50557->50558 50561 403464 50557->50561 50560 4034bc 4 API calls 50558->50560 50558->50561 50559 403490 50563 403400 50559->50563 50560->50561 50561->50559 50582 402660 50561->50582 50564 403406 50563->50564 50565 40341f 50563->50565 50564->50565 50566 402660 4 API calls 50564->50566 50565->50477 50566->50565 50572 4034bc 50567->50572 50569 403400 4 API calls 50571 403508 50569->50571 50570 4034f0 50570->50569 50571->50557 50573 4034c0 50572->50573 50574 4034dc 50572->50574 50577 402648 50573->50577 50574->50570 50576 4034c9 50576->50570 50578 40264c 50577->50578 50579 402656 50577->50579 50578->50579 50581 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50578->50581 50579->50576 50579->50579 50581->50579 50583 402664 50582->50583 50584 40266e 50582->50584 50583->50584 50586 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50583->50586 50584->50559 50584->50584 50586->50584 50589 403426 50587->50589 50588 40344b 50588->50489 50589->50588 50590 402660 4 API calls 50589->50590 50590->50589 50592 4085b1 50591->50592 50593 40859f 50591->50593 50594 403494 4 API calls 50592->50594 50595 4034e0 4 API calls 50593->50595 50596 4085af 50594->50596 50595->50596 50596->50492 50598 4085e0 50597->50598 50598->50500 50607 403498 50605->50607 50606 4034ba 50606->50530 50607->50606 50608 402660 4 API calls 50607->50608 50608->50606 52909 441408 52910 441411 52909->52910 52911 44141f WriteFile 52909->52911 52910->52911 52912 44142a 52911->52912 52913 40ce8c 52914 40ce94 52913->52914 52915 40cec2 52914->52915 52916 40ceb7 52914->52916 52920 40cebe 52914->52920 52918 40cec6 52915->52918 52919 40ced8 52915->52919 52926 406298 GlobalHandle GlobalUnlock GlobalFree 52916->52926 52925 40626c GlobalAlloc GlobalLock 52918->52925 52927 40627c GlobalHandle GlobalUnlock GlobalReAlloc GlobalLock 52919->52927 52923 40ced4 52923->52920 52924 408ccc 5 API calls 52923->52924 52924->52920 52925->52923 52926->52920 52927->52923 52928 41364c SetWindowLongA GetWindowLongA 52929 4136a9 SetPropA SetPropA 52928->52929 52930 41368b GetWindowLongA 52928->52930 52934 41f3ac 52929->52934 52930->52929 52931 41369a SetWindowLongA 52930->52931 52931->52929 52939 415280 52934->52939 52946 423c1c 52934->52946 53040 423a94 52934->53040 52935 4136f9 52940 41528d 52939->52940 52941 4152f3 52940->52941 52942 4152e8 52940->52942 52945 4152f1 52940->52945 53047 424b9c 13 API calls 52941->53047 52942->52945 53048 41506c 46 API calls 52942->53048 52945->52935 52949 423c52 52946->52949 52969 423c73 52949->52969 53049 423b78 52949->53049 52950 423cfc 52954 423d03 52950->52954 52955 423d37 52950->52955 52951 423c9d 52952 423ca3 52951->52952 52953 423d60 52951->52953 52956 423cd5 52952->52956 52957 423ca8 52952->52957 52960 423d72 52953->52960 52961 423d7b 52953->52961 52962 423d09 52954->52962 52999 423fc1 52954->52999 52958 423d42 52955->52958 52959 4240aa IsIconic 52955->52959 52956->52969 52988 423cee 52956->52988 52989 423e4f 52956->52989 52963 423e06 52957->52963 52964 423cae 52957->52964 52965 4240e6 52958->52965 52966 423d4b 52958->52966 52959->52969 52971 4240be GetFocus 52959->52971 52967 423d88 52960->52967 52968 423d79 52960->52968 53058 4241a4 11 API calls 52961->53058 52972 423f23 SendMessageA 52962->52972 52973 423d17 52962->52973 53063 423b94 NtdllDefWindowProc_A 52963->53063 52975 423cb7 52964->52975 52976 423e2e PostMessageA 52964->52976 53080 424860 WinHelpA PostMessageA 52965->53080 52979 4240fd 52966->52979 52997 423cd0 52966->52997 52980 4241ec 11 API calls 52967->52980 53059 423b94 NtdllDefWindowProc_A 52968->53059 52969->52935 52971->52969 52974 4240cf 52971->52974 52972->52969 52973->52969 52973->52997 53017 423f66 52973->53017 53079 41f004 GetCurrentThreadId EnumThreadWindows 52974->53079 52983 423cc0 52975->52983 52984 423eb5 52975->52984 53064 423b94 NtdllDefWindowProc_A 52976->53064 52986 424106 52979->52986 52987 42411b 52979->52987 52980->52969 52992 423cc9 52983->52992 52993 423dde IsIconic 52983->52993 52994 423ebe 52984->52994 52995 423eef 52984->52995 52985 423e49 52985->52969 52996 4244e4 5 API calls 52986->52996 53081 42453c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 52987->53081 52988->52997 52998 423e1b 52988->52998 53053 423b94 NtdllDefWindowProc_A 52989->53053 52991 4240d6 52991->52969 53002 4240de SetFocus 52991->53002 52992->52997 53003 423da1 52992->53003 53005 423dfa 52993->53005 53006 423dee 52993->53006 53066 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52994->53066 53054 423b94 NtdllDefWindowProc_A 52995->53054 52996->52969 52997->52969 53057 423b94 NtdllDefWindowProc_A 52997->53057 53009 424188 12 API calls 52998->53009 52999->52969 53014 423fe7 IsWindowEnabled 52999->53014 53002->52969 53003->52969 53060 422c5c ShowWindow PostMessageA PostQuitMessage 53003->53060 53062 423b94 NtdllDefWindowProc_A 53005->53062 53061 423bd0 15 API calls 53006->53061 53009->52969 53010 423e55 53011 423e93 53010->53011 53012 423e71 53010->53012 53019 423a94 6 API calls 53011->53019 53065 423b24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 53012->53065 53013 423ec6 53032 423ed8 53013->53032 53067 41ef68 53013->53067 53014->52969 53028 423ff5 53014->53028 53017->52969 53023 423f88 IsWindowEnabled 53017->53023 53025 423e9b PostMessageA 53019->53025 53021 423ef5 53022 423f0d 53021->53022 53055 41eeb4 GetCurrentThreadId EnumThreadWindows 53021->53055 53030 423a94 6 API calls 53022->53030 53023->52969 53031 423f96 53023->53031 53024 423e79 PostMessageA 53024->52969 53025->52969 53033 423ffc IsWindowVisible 53028->53033 53030->52969 53074 412320 7 API calls 53031->53074 53073 423b94 NtdllDefWindowProc_A 53032->53073 53033->52969 53035 42400a GetFocus 53033->53035 53075 4181f0 53035->53075 53037 42401f SetFocus 53077 415250 53037->53077 53041 423b1d 53040->53041 53042 423aa4 53040->53042 53041->52935 53042->53041 53043 423aaa EnumWindows 53042->53043 53043->53041 53044 423ac6 GetWindow GetWindowLongA 53043->53044 53082 423a2c GetWindow 53043->53082 53045 423ae5 53044->53045 53045->53041 53046 423b11 SetWindowPos 53045->53046 53046->53041 53046->53045 53047->52945 53048->52945 53050 423b82 53049->53050 53051 423b8d 53049->53051 53050->53051 53052 408730 7 API calls 53050->53052 53051->52950 53051->52951 53052->53051 53053->53010 53054->53021 53056 41ef39 53055->53056 53056->53022 53057->52969 53058->52969 53059->52969 53060->52969 53061->52969 53062->52969 53063->52969 53064->52985 53065->53024 53066->53013 53068 41ef70 IsWindow 53067->53068 53069 41ef9c 53067->53069 53070 41ef8a 53068->53070 53071 41ef7f EnableWindow 53068->53071 53069->53032 53070->53068 53070->53069 53072 402660 4 API calls 53070->53072 53071->53070 53072->53070 53073->52969 53074->52969 53076 4181fa 53075->53076 53076->53037 53078 41526b SetFocus 53077->53078 53078->52969 53079->52991 53080->52985 53081->52985 53083 423a4d GetWindowLongA 53082->53083 53084 423a59 53082->53084 53083->53084 53085 40cd10 53086 40cd1d 53085->53086 53088 40cd22 53085->53088 53089 406f58 CloseHandle 53086->53089 53089->53088 53090 416b52 53091 416bfa 53090->53091 53092 416b6a 53090->53092 53109 41532c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53091->53109 53094 416b84 SendMessageA 53092->53094 53095 416b78 53092->53095 53096 416bd8 53094->53096 53097 416b82 CallWindowProcA 53095->53097 53098 416b9e 53095->53098 53097->53096 53106 41a068 GetSysColor 53098->53106 53101 416ba9 SetTextColor 53102 416bbe 53101->53102 53107 41a068 GetSysColor 53102->53107 53104 416bc3 SetBkColor 53108 41a6f0 GetSysColor CreateBrushIndirect 53104->53108 53106->53101 53107->53104 53108->53096 53109->53096 53110 49219c 53111 4921d6 53110->53111 53112 4921d8 53111->53112 53113 4921e2 53111->53113 53310 4090a8 MessageBeep 53112->53310 53115 49221a 53113->53115 53116 4921f1 53113->53116 53123 492229 53115->53123 53124 492252 53115->53124 53118 44706c 18 API calls 53116->53118 53117 403420 4 API calls 53119 49282e 53117->53119 53120 4921fe 53118->53120 53121 403400 4 API calls 53119->53121 53311 406bc0 53120->53311 53125 492836 53121->53125 53127 44706c 18 API calls 53123->53127 53130 49228a 53124->53130 53131 492261 53124->53131 53129 492236 53127->53129 53319 406c10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53129->53319 53137 492299 53130->53137 53138 4922b2 53130->53138 53134 44706c 18 API calls 53131->53134 53133 492241 53320 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53133->53320 53136 49226e 53134->53136 53321 406c44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53136->53321 53323 407290 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 53137->53323 53145 4922c1 53138->53145 53146 4922e6 53138->53146 53141 492279 53322 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53141->53322 53142 4922a1 53324 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53142->53324 53147 44706c 18 API calls 53145->53147 53149 49231e 53146->53149 53150 4922f5 53146->53150 53148 4922ce 53147->53148 53325 4072b8 53148->53325 53157 49232d 53149->53157 53158 492356 53149->53158 53152 44706c 18 API calls 53150->53152 53154 492302 53152->53154 53153 4922d6 53328 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53153->53328 53156 42c814 5 API calls 53154->53156 53159 49230d 53156->53159 53160 44706c 18 API calls 53157->53160 53163 4923a2 53158->53163 53164 492365 53158->53164 53329 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53159->53329 53162 49233a 53160->53162 53330 407208 8 API calls 53162->53330 53170 4923da 53163->53170 53171 4923b1 53163->53171 53167 44706c 18 API calls 53164->53167 53166 492345 53331 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53166->53331 53169 492374 53167->53169 53172 44706c 18 API calls 53169->53172 53178 4923e9 53170->53178 53179 492412 53170->53179 53173 44706c 18 API calls 53171->53173 53174 492385 53172->53174 53175 4923be 53173->53175 53332 491ea0 8 API calls 53174->53332 53177 42c8b4 5 API calls 53175->53177 53181 4923c9 53177->53181 53182 44706c 18 API calls 53178->53182 53186 49244a 53179->53186 53187 492421 53179->53187 53180 492391 53333 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53180->53333 53334 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53181->53334 53185 4923f6 53182->53185 53335 42c8dc 53185->53335 53193 492459 53186->53193 53194 492482 53186->53194 53190 44706c 18 API calls 53187->53190 53192 49242e 53190->53192 53344 42c90c LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 53192->53344 53196 44706c 18 API calls 53193->53196 53201 4924ba 53194->53201 53202 492491 53194->53202 53198 492466 53196->53198 53197 492439 53345 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53197->53345 53200 42c93c 5 API calls 53198->53200 53203 492471 53200->53203 53207 4924c9 53201->53207 53210 492506 53201->53210 53204 44706c 18 API calls 53202->53204 53346 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53203->53346 53206 49249e 53204->53206 53347 42c964 53206->53347 53209 44706c 18 API calls 53207->53209 53212 4924d8 53209->53212 53214 492558 53210->53214 53215 492515 53210->53215 53217 44706c 18 API calls 53212->53217 53224 4925cb 53214->53224 53225 492567 53214->53225 53218 44706c 18 API calls 53215->53218 53216 4921dd 53216->53117 53219 4924e9 53217->53219 53220 492528 53218->53220 53353 42c508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 53219->53353 53222 44706c 18 API calls 53220->53222 53226 492539 53222->53226 53223 4924f5 53354 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53223->53354 53232 49260a 53224->53232 53233 4925da 53224->53233 53298 44706c 53225->53298 53355 492098 12 API calls 53226->53355 53231 492547 53356 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53231->53356 53243 492649 53232->53243 53244 492619 53232->53244 53237 44706c 18 API calls 53233->53237 53235 492582 53239 4925bb 53235->53239 53240 492586 53235->53240 53238 4925e7 53237->53238 53359 45297c Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 53238->53359 53358 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53239->53358 53242 44706c 18 API calls 53240->53242 53247 492595 53242->53247 53252 492688 53243->53252 53253 492658 53243->53253 53248 44706c 18 API calls 53244->53248 53246 4925f4 53360 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53246->53360 53303 452cf4 53247->53303 53251 492626 53248->53251 53361 4527e4 53251->53361 53263 4926d0 53252->53263 53264 492697 53252->53264 53257 44706c 18 API calls 53253->53257 53254 492605 53254->53216 53255 4925a5 53357 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53255->53357 53260 492665 53257->53260 53259 492633 53368 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53259->53368 53369 452e84 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 53260->53369 53269 492718 53263->53269 53270 4926df 53263->53270 53266 44706c 18 API calls 53264->53266 53265 492672 53370 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53265->53370 53268 4926a6 53266->53268 53271 44706c 18 API calls 53268->53271 53275 49272b 53269->53275 53282 4927e1 53269->53282 53273 44706c 18 API calls 53270->53273 53272 4926b7 53271->53272 53371 4472ec 53272->53371 53274 4926ee 53273->53274 53276 44706c 18 API calls 53274->53276 53278 44706c 18 API calls 53275->53278 53279 4926ff 53276->53279 53280 492758 53278->53280 53285 4472ec 5 API calls 53279->53285 53281 44706c 18 API calls 53280->53281 53283 49276f 53281->53283 53282->53216 53380 447010 18 API calls 53282->53380 53377 407dec 7 API calls 53283->53377 53285->53216 53286 4927fa 53287 42e8d8 5 API calls 53286->53287 53288 492802 53287->53288 53381 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53288->53381 53291 492791 53292 44706c 18 API calls 53291->53292 53293 4927a5 53292->53293 53378 408518 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53293->53378 53295 4927b0 53379 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53295->53379 53297 4927bc 53299 447074 53298->53299 53382 4360ec 53299->53382 53301 447093 53302 42c618 7 API calls 53301->53302 53302->53235 53304 452798 2 API calls 53303->53304 53306 452d0d 53304->53306 53305 452d11 53305->53255 53306->53305 53307 452d35 MoveFileA GetLastError 53306->53307 53308 4527d4 Wow64RevertWow64FsRedirection 53307->53308 53309 452d5b 53308->53309 53309->53255 53310->53216 53312 406bcf 53311->53312 53313 406be8 53312->53313 53314 406bf1 53312->53314 53315 403400 4 API calls 53313->53315 53316 403778 4 API calls 53314->53316 53317 406bef 53315->53317 53316->53317 53318 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53317->53318 53318->53216 53319->53133 53320->53216 53321->53141 53322->53216 53323->53142 53324->53216 53326 403738 53325->53326 53327 4072c2 SetCurrentDirectoryA 53326->53327 53327->53153 53328->53216 53329->53216 53330->53166 53331->53216 53332->53180 53333->53216 53334->53216 53408 42c684 53335->53408 53338 42c8f0 53340 403400 4 API calls 53338->53340 53339 42c8f9 53341 403778 4 API calls 53339->53341 53342 42c8f7 53340->53342 53341->53342 53343 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53342->53343 53343->53216 53344->53197 53345->53216 53346->53216 53348 42c7ac IsDBCSLeadByte 53347->53348 53349 42c974 53348->53349 53350 403778 4 API calls 53349->53350 53351 42c985 53350->53351 53352 4473c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53351->53352 53352->53216 53353->53223 53354->53216 53355->53231 53356->53216 53357->53216 53358->53216 53359->53246 53360->53254 53362 452798 2 API calls 53361->53362 53363 4527fa 53362->53363 53364 4527fe 53363->53364 53365 45281c CreateDirectoryA GetLastError 53363->53365 53364->53259 53366 4527d4 Wow64RevertWow64FsRedirection 53365->53366 53367 452842 53366->53367 53367->53259 53368->53216 53369->53265 53370->53216 53372 4472f4 53371->53372 53411 436454 VariantClear 53372->53411 53374 447317 53375 44732e 53374->53375 53412 408c1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53374->53412 53375->53216 53377->53291 53378->53295 53379->53297 53380->53286 53381->53216 53383 4360f8 53382->53383 53384 43611a 53382->53384 53383->53384 53402 408c1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53383->53402 53385 43619d 53384->53385 53387 436161 53384->53387 53388 436191 53384->53388 53389 436185 53384->53389 53390 436179 53384->53390 53391 43616d 53384->53391 53407 408c1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53385->53407 53403 403510 53387->53403 53406 4040e8 18 API calls 53388->53406 53393 403494 4 API calls 53389->53393 53390->53301 53397 403510 4 API calls 53391->53397 53398 43618e 53393->53398 53396 4361ae 53396->53301 53401 436176 53397->53401 53398->53301 53399 43619a 53399->53301 53401->53301 53402->53384 53404 4034e0 4 API calls 53403->53404 53405 40351d 53404->53405 53405->53301 53406->53399 53407->53396 53409 42c68c IsDBCSLeadByte 53408->53409 53410 42c68b 53409->53410 53410->53338 53410->53339 53411->53374 53412->53375 53413 416654 53414 416661 53413->53414 53415 4166bb 53413->53415 53420 416560 CreateWindowExA 53414->53420 53416 416668 SetPropA SetPropA 53416->53415 53417 41669b 53416->53417 53418 4166ae SetWindowPos 53417->53418 53418->53415 53420->53416 53421 46bc10 53422 46bc44 53421->53422 53454 46c0ad 53421->53454 53424 46bc80 53422->53424 53427 46bcdc 53422->53427 53428 46bcba 53422->53428 53429 46bccb 53422->53429 53430 46bc98 53422->53430 53431 46bca9 53422->53431 53423 403400 4 API calls 53426 46c0ec 53423->53426 53425 468d38 19 API calls 53424->53425 53424->53454 53441 46bd18 53425->53441 53432 403400 4 API calls 53426->53432 53698 46bba0 46 API calls 53427->53698 53477 46b7d0 53428->53477 53697 46b990 68 API calls 53429->53697 53695 46b520 48 API calls 53430->53695 53696 46b688 43 API calls 53431->53696 53438 46c0f4 53432->53438 53439 46bc9e 53439->53424 53439->53454 53440 46bd5b 53443 468c74 19 API calls 53440->53443 53444 414af8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53440->53444 53445 46be7e 53440->53445 53448 42cbd0 6 API calls 53440->53448 53450 46b02c 23 API calls 53440->53450 53451 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53440->53451 53440->53454 53455 46bed7 53440->53455 53473 46bf9f 53440->53473 53512 46ad98 53440->53512 53622 483568 53440->53622 53719 46b2dc 19 API calls 53440->53719 53441->53440 53441->53454 53699 495478 53441->53699 53443->53440 53444->53440 53718 483a70 124 API calls 53445->53718 53448->53440 53449 46be99 53449->53454 53450->53440 53451->53440 53454->53423 53519 469fe0 53455->53519 53456 46b02c 23 API calls 53456->53454 53458 46bf3d 53459 403450 4 API calls 53458->53459 53460 46bf4d 53459->53460 53461 46bfa9 53460->53461 53462 46bf59 53460->53462 53465 46b02c 23 API calls 53461->53465 53467 46c06b 53461->53467 53463 457fc4 24 API calls 53462->53463 53464 46bf78 53463->53464 53466 457fc4 24 API calls 53464->53466 53468 46bfc3 53465->53468 53466->53473 53469 46c004 53468->53469 53470 46bfec SetActiveWindow 53468->53470 53580 46a388 53469->53580 53470->53469 53472 46c02e 53472->53473 53474 46c04e 53472->53474 53473->53456 53475 46aea8 21 API calls 53474->53475 53476 46c063 53475->53476 53720 46c524 53477->53720 53480 46b952 53481 403420 4 API calls 53480->53481 53483 46b96c 53481->53483 53482 414af8 4 API calls 53484 46b81e 53482->53484 53485 403400 4 API calls 53483->53485 53510 46b93e 53484->53510 53723 45602c 13 API calls 53484->53723 53488 46b974 53485->53488 53487 403450 4 API calls 53487->53480 53489 403400 4 API calls 53488->53489 53490 46b97c 53489->53490 53490->53424 53491 46b901 53491->53480 53497 42cd58 7 API calls 53491->53497 53491->53510 53493 46b8a1 53493->53480 53493->53491 53725 42cd58 53493->53725 53495 46b83c 53495->53493 53496 4666a8 19 API calls 53495->53496 53499 46b86b 53496->53499 53500 46b917 53497->53500 53498 4514cc 4 API calls 53501 46b8f1 53498->53501 53502 4666a8 19 API calls 53499->53502 53503 4514cc 4 API calls 53500->53503 53500->53510 53728 47f454 43 API calls 53501->53728 53505 46b87c 53502->53505 53506 46b92e 53503->53506 53507 45149c 4 API calls 53505->53507 53729 47f454 43 API calls 53506->53729 53509 46b891 53507->53509 53724 47f454 43 API calls 53509->53724 53510->53480 53510->53487 53513 46ada9 53512->53513 53515 46ada4 53512->53515 53935 469b44 46 API calls 53513->53935 53514 46ada7 53514->53440 53515->53514 53850 46a804 53515->53850 53518 46adb1 53518->53440 53520 403400 4 API calls 53519->53520 53521 46a00e 53520->53521 53951 47e184 53521->53951 53523 46a071 53524 46a075 53523->53524 53525 46a08e 53523->53525 53526 4668a8 20 API calls 53524->53526 53527 46a07f 53525->53527 53958 495368 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53525->53958 53526->53527 53529 46a1ad 53527->53529 53530 46a218 53527->53530 53579 46a322 53527->53579 53533 403494 4 API calls 53529->53533 53534 403494 4 API calls 53530->53534 53531 403420 4 API calls 53535 46a34c 53531->53535 53532 46a0aa 53532->53527 53536 46a0b2 53532->53536 53537 46a1ba 53533->53537 53538 46a225 53534->53538 53535->53458 53539 46b02c 23 API calls 53536->53539 53540 40357c 4 API calls 53537->53540 53541 40357c 4 API calls 53538->53541 53546 46a0bf 53539->53546 53542 46a1c7 53540->53542 53543 46a232 53541->53543 53544 40357c 4 API calls 53542->53544 53545 40357c 4 API calls 53543->53545 53547 46a1d4 53544->53547 53548 46a23f 53545->53548 53551 46a100 53546->53551 53552 46a0e8 SetActiveWindow 53546->53552 53549 40357c 4 API calls 53547->53549 53550 40357c 4 API calls 53548->53550 53553 46a1e1 53549->53553 53554 46a24c 53550->53554 53959 42f5d4 53551->53959 53552->53551 53555 4668a8 20 API calls 53553->53555 53556 40357c 4 API calls 53554->53556 53557 46a1ef 53555->53557 53558 46a25a 53556->53558 53561 40357c 4 API calls 53557->53561 53559 414b28 4 API calls 53558->53559 53563 46a216 53559->53563 53562 46a1f8 53561->53562 53565 40357c 4 API calls 53562->53565 53566 466be0 11 API calls 53563->53566 53568 46a205 53565->53568 53573 46a27c 53566->53573 53570 414b28 4 API calls 53568->53570 53569 46a151 53571 46aea8 21 API calls 53569->53571 53570->53563 53572 46a183 53571->53572 53572->53458 53574 414b28 4 API calls 53573->53574 53573->53579 53575 46a2df 53574->53575 53976 496228 MulDiv 53575->53976 53577 46a2fc 53578 414b28 4 API calls 53577->53578 53578->53579 53579->53531 53585 46a3b4 53580->53585 53582 46a3ef 53589 46a564 53582->53589 53595 46a403 53582->53595 53583 46a6e4 53587 403400 4 API calls 53583->53587 53584 46a58b 53591 414b28 4 API calls 53584->53591 53585->53582 54032 47e48c 53585->54032 53586 46a541 53592 46a55c 53586->53592 53599 402660 4 API calls 53586->53599 53593 46a709 53587->53593 53588 402648 4 API calls 53588->53595 53589->53583 53589->53584 53590 46a5a1 53589->53590 53597 414b28 4 API calls 53590->53597 53596 46a59f 53591->53596 53592->53472 53593->53472 53594 402660 4 API calls 53594->53595 53595->53588 53595->53594 53605 46a476 53595->53605 54048 496228 MulDiv 53596->54048 53597->53596 53598 46a50d 53600 457fc4 24 API calls 53598->53600 53599->53592 53600->53586 53603 46a5c2 53606 466be0 11 API calls 53603->53606 53604 457fc4 24 API calls 53604->53605 53605->53586 53605->53598 53605->53604 53608 40357c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53605->53608 54047 403ba4 7 API calls 53605->54047 53607 46a5f6 53606->53607 54049 466be8 KiUserCallbackDispatcher 53607->54049 53608->53605 53610 46a609 53611 466be0 11 API calls 53610->53611 53612 46a61a 53611->53612 53613 414b28 4 API calls 53612->53613 53614 46a64d 53613->53614 54050 496228 MulDiv 53614->54050 53616 46a66a 53617 414b28 4 API calls 53616->53617 53618 46a6a1 53617->53618 54051 496228 MulDiv 53618->54051 53620 46a6be 53621 414b28 4 API calls 53620->53621 53621->53583 53623 46c524 49 API calls 53622->53623 53624 4835ab 53623->53624 53625 4835b4 53624->53625 54269 408bf0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53624->54269 53627 414af8 4 API calls 53625->53627 53628 4835c4 53627->53628 53629 403450 4 API calls 53628->53629 53630 4835d1 53629->53630 54079 46c87c 53630->54079 53633 4835e1 53635 414af8 4 API calls 53633->53635 53636 4835f1 53635->53636 53637 403450 4 API calls 53636->53637 53638 4835fe 53637->53638 53639 46992c SendMessageA 53638->53639 53640 483617 53639->53640 53641 483668 53640->53641 54271 47a29c 23 API calls 53640->54271 53643 4241ec 11 API calls 53641->53643 53644 483672 53643->53644 53645 483698 53644->53645 53646 483683 SetActiveWindow 53644->53646 54108 482998 53645->54108 53646->53645 53695->53439 53696->53424 53697->53424 53698->53424 55801 43da3c 53699->55801 53702 49552a 53704 495539 53702->53704 55839 494ca0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53702->55839 53703 4954a4 55806 431c44 53703->55806 53704->53440 53713 4954ee 55837 494d34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53713->55837 53715 495502 55838 433e44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53715->55838 53717 495522 53717->53440 53718->53449 53719->53440 53730 46c5bc 53720->53730 53723->53495 53724->53493 53844 42ccdc 53725->53844 53728->53491 53729->53510 53731 414af8 4 API calls 53730->53731 53732 46c5f0 53731->53732 53791 466940 53732->53791 53735 414b28 4 API calls 53736 46c602 53735->53736 53737 46c611 53736->53737 53742 46c62a 53736->53742 53820 47f454 43 API calls 53737->53820 53739 46c625 53740 403420 4 API calls 53739->53740 53741 46b802 53740->53741 53741->53480 53741->53482 53743 46c671 53742->53743 53744 46c658 53742->53744 53745 46c6d6 53743->53745 53758 46c675 53743->53758 53821 47f454 43 API calls 53744->53821 53823 42cb5c CharNextA 53745->53823 53748 46c6e5 53749 46c6e9 53748->53749 53753 46c702 53748->53753 53824 47f454 43 API calls 53749->53824 53751 46c6bd 53822 47f454 43 API calls 53751->53822 53752 46c726 53825 47f454 43 API calls 53752->53825 53753->53752 53800 466ab0 53753->53800 53758->53751 53758->53753 53761 46c73f 53762 403778 4 API calls 53761->53762 53763 46c755 53762->53763 53808 42c9ac 53763->53808 53766 46c766 53826 466b3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53766->53826 53767 46c797 53769 42c8dc 5 API calls 53767->53769 53771 46c7a2 53769->53771 53770 46c779 53772 4514cc 4 API calls 53770->53772 53773 42c40c 5 API calls 53771->53773 53774 46c786 53772->53774 53775 46c7ad 53773->53775 53827 47f454 43 API calls 53774->53827 53777 42cbd0 6 API calls 53775->53777 53778 46c7b8 53777->53778 53812 46c550 53778->53812 53780 46c7c0 53781 42cd58 7 API calls 53780->53781 53782 46c7c8 53781->53782 53783 46c7e2 53782->53783 53784 46c7cc 53782->53784 53783->53739 53786 46c7ec 53783->53786 53828 47f454 43 API calls 53784->53828 53787 46c7f4 GetDriveTypeA 53786->53787 53787->53739 53788 46c7ff 53787->53788 53829 47f454 43 API calls 53788->53829 53790 46c813 53790->53739 53792 46695a 53791->53792 53794 42cbd0 6 API calls 53792->53794 53795 403450 4 API calls 53792->53795 53796 406bc0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53792->53796 53797 4669a3 53792->53797 53830 42cabc 53792->53830 53794->53792 53795->53792 53796->53792 53798 403420 4 API calls 53797->53798 53799 4669bd 53798->53799 53799->53735 53801 466aba 53800->53801 53802 466acd 53801->53802 53841 42cb4c CharNextA 53801->53841 53802->53752 53804 466ae0 53802->53804 53805 466aea 53804->53805 53806 466b17 53805->53806 53842 42cb4c CharNextA 53805->53842 53806->53752 53806->53761 53809 42ca05 53808->53809 53810 42c9c2 53808->53810 53809->53766 53809->53767 53810->53809 53843 42cb4c CharNextA 53810->53843 53813 46c5b5 53812->53813 53814 46c563 53812->53814 53813->53780 53814->53813 53815 41eeb4 2 API calls 53814->53815 53816 46c573 53815->53816 53817 46c58d SHPathPrepareForWriteA 53816->53817 53818 41ef68 6 API calls 53817->53818 53819 46c5ad 53818->53819 53819->53780 53820->53739 53821->53739 53822->53739 53823->53748 53824->53739 53825->53739 53826->53770 53827->53739 53828->53739 53829->53790 53831 403494 4 API calls 53830->53831 53834 42cacc 53831->53834 53832 403744 4 API calls 53832->53834 53834->53832 53836 42cb02 53834->53836 53839 42c454 IsDBCSLeadByte 53834->53839 53835 42cb46 53835->53792 53836->53835 53838 4037b8 4 API calls 53836->53838 53840 42c454 IsDBCSLeadByte 53836->53840 53838->53836 53839->53834 53840->53836 53841->53801 53842->53805 53843->53810 53845 42cbd0 6 API calls 53844->53845 53846 42ccfe 53845->53846 53847 42cd06 GetFileAttributesA 53846->53847 53848 403400 4 API calls 53847->53848 53849 42cd23 53848->53849 53849->53491 53849->53498 53852 46a84b 53850->53852 53851 46acc3 53853 46acde 53851->53853 53854 46ad0f 53851->53854 53852->53851 53855 46a906 53852->53855 53859 403494 4 API calls 53852->53859 53858 403494 4 API calls 53853->53858 53856 403494 4 API calls 53854->53856 53857 46a927 53855->53857 53861 46a968 53855->53861 53860 46ad1d 53856->53860 53862 403494 4 API calls 53857->53862 53863 46acec 53858->53863 53864 46a88a 53859->53864 53948 469220 12 API calls 53860->53948 53865 403400 4 API calls 53861->53865 53867 46a935 53862->53867 53947 469220 12 API calls 53863->53947 53869 414af8 4 API calls 53864->53869 53870 46a966 53865->53870 53871 414af8 4 API calls 53867->53871 53873 46a8ab 53869->53873 53893 46aa4c 53870->53893 53936 46992c 53870->53936 53875 46a956 53871->53875 53872 46acfa 53874 403400 4 API calls 53872->53874 53876 403634 4 API calls 53873->53876 53878 46ad40 53874->53878 53880 403634 4 API calls 53875->53880 53881 46a8bb 53876->53881 53885 403400 4 API calls 53878->53885 53879 46aad4 53883 403400 4 API calls 53879->53883 53880->53870 53882 414af8 4 API calls 53881->53882 53886 46a8cf 53882->53886 53887 46aad2 53883->53887 53884 46a988 53888 46a9c6 53884->53888 53889 46a98e 53884->53889 53890 46ad48 53885->53890 53886->53855 53895 414af8 4 API calls 53886->53895 53942 469d68 43 API calls 53887->53942 53894 403400 4 API calls 53888->53894 53891 403494 4 API calls 53889->53891 53892 403420 4 API calls 53890->53892 53896 46a99c 53891->53896 53897 46ad55 53892->53897 53893->53879 53898 46aa93 53893->53898 53899 46a9c4 53894->53899 53900 46a8f6 53895->53900 53902 47c6f0 43 API calls 53896->53902 53897->53514 53903 403494 4 API calls 53898->53903 53908 469c20 43 API calls 53899->53908 53904 403634 4 API calls 53900->53904 53906 46a9b4 53902->53906 53907 46aaa1 53903->53907 53904->53855 53905 46aafd 53914 46ab5e 53905->53914 53915 46ab08 53905->53915 53909 403634 4 API calls 53906->53909 53910 414af8 4 API calls 53907->53910 53912 46a9ed 53908->53912 53909->53899 53911 46aac2 53910->53911 53913 403634 4 API calls 53911->53913 53918 46aa4e 53912->53918 53919 46a9f8 53912->53919 53913->53887 53916 403400 4 API calls 53914->53916 53917 403494 4 API calls 53915->53917 53920 46ab66 53916->53920 53924 46ab16 53917->53924 53921 403400 4 API calls 53918->53921 53922 403494 4 API calls 53919->53922 53923 46ab5c 53920->53923 53934 46ac0f 53920->53934 53921->53893 53927 46aa06 53922->53927 53923->53920 53943 495368 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53923->53943 53924->53920 53924->53923 53929 403634 4 API calls 53924->53929 53926 46ab89 53926->53934 53944 495614 18 API calls 53926->53944 53927->53893 53930 403634 4 API calls 53927->53930 53929->53924 53930->53927 53932 46acb0 53946 429154 SendMessageA SendMessageA 53932->53946 53945 429104 SendMessageA 53934->53945 53935->53518 53949 42a050 SendMessageA 53936->53949 53938 46993b 53939 46995b 53938->53939 53950 42a050 SendMessageA 53938->53950 53939->53884 53941 46994b 53941->53884 53942->53905 53943->53926 53944->53934 53945->53932 53946->53851 53947->53872 53948->53872 53949->53938 53950->53941 53952 47e19d 53951->53952 53955 47e1da 53951->53955 53977 455db4 53952->53977 53955->53523 53957 47e1f1 53957->53523 53958->53532 53960 42f5e0 53959->53960 53961 42f603 GetActiveWindow GetFocus 53960->53961 53962 41eeb4 2 API calls 53961->53962 53963 42f61a 53962->53963 53964 42f637 53963->53964 53965 42f627 RegisterClassA 53963->53965 53966 42f6c6 SetFocus 53964->53966 53967 42f645 CreateWindowExA 53964->53967 53965->53964 53969 403400 4 API calls 53966->53969 53967->53966 53968 42f678 53967->53968 54026 42428c 53968->54026 53971 42f6e2 53969->53971 53975 495614 18 API calls 53971->53975 53972 42f6a0 53973 42f6a8 CreateWindowExA 53972->53973 53973->53966 53974 42f6be ShowWindow 53973->53974 53974->53966 53975->53569 53976->53577 53978 455dc5 53977->53978 53979 455dd2 53978->53979 53980 455dc9 53978->53980 54011 455b98 29 API calls 53979->54011 54003 455ab8 53980->54003 53983 455dcf 53983->53955 53984 47ddf4 53983->53984 53989 47def0 53984->53989 53992 47de34 53984->53992 53985 403420 4 API calls 53986 47dfd3 53985->53986 53986->53957 53987 479a9c 19 API calls 53987->53989 53988 479bdc 19 API calls 53988->53992 53989->53987 53993 47df41 53989->53993 53999 47de93 53989->53999 53991 47c6f0 43 API calls 53991->53993 53992->53988 53992->53989 53996 47c6f0 43 API calls 53992->53996 53992->53999 54001 47de9c 53992->54001 54020 479d58 53992->54020 53993->53989 53993->53991 53995 454174 20 API calls 53993->53995 53998 47dedd 53993->53998 53994 47c6f0 43 API calls 53994->54001 53995->53993 53996->53992 53997 42c93c 5 API calls 53997->54001 53998->53999 53999->53985 54000 42c964 5 API calls 54000->54001 54001->53992 54001->53994 54001->53997 54001->53998 54001->54000 54024 47db00 52 API calls 54001->54024 54004 42de2c RegOpenKeyExA 54003->54004 54006 455ad5 54004->54006 54005 455b23 54005->53983 54006->54005 54012 4559ec 54006->54012 54009 4559ec 6 API calls 54010 455b04 RegCloseKey 54009->54010 54010->53983 54011->53983 54017 42dd68 54012->54017 54014 403420 4 API calls 54016 455a9e 54014->54016 54015 455a14 54015->54014 54016->54009 54018 42dc10 6 API calls 54017->54018 54019 42dd71 54018->54019 54019->54015 54022 479d64 54020->54022 54021 479d7f 54021->53992 54022->54021 54025 4533b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54022->54025 54024->54001 54025->54021 54027 4242be 54026->54027 54028 42429e GetWindowTextA 54026->54028 54030 403494 4 API calls 54027->54030 54029 4034e0 4 API calls 54028->54029 54031 4242bc 54029->54031 54030->54031 54031->53972 54033 402648 4 API calls 54032->54033 54034 47e4b0 54033->54034 54035 47ddf4 61 API calls 54034->54035 54036 47e4d3 54035->54036 54037 47e4e0 54036->54037 54038 47e568 54036->54038 54075 4953c4 18 API calls 54037->54075 54040 47e57c 54038->54040 54052 47e21c 54038->54052 54041 47e5a8 54040->54041 54045 402660 4 API calls 54040->54045 54044 402660 4 API calls 54041->54044 54042 47e522 54042->53582 54046 47e5b2 54044->54046 54045->54040 54046->53582 54047->53605 54048->53603 54049->53610 54050->53616 54051->53620 54053 403494 4 API calls 54052->54053 54054 47e24b 54053->54054 54055 42c93c 5 API calls 54054->54055 54066 47e2af 54054->54066 54056 47e266 54055->54056 54076 42ca10 7 API calls 54056->54076 54057 47e2bf 54059 403400 4 API calls 54057->54059 54062 47e3f9 54059->54062 54060 47e32b 54060->54057 54061 47e380 54060->54061 54078 453c80 11 API calls 54060->54078 54069 402648 4 API calls 54061->54069 54064 403420 4 API calls 54062->54064 54067 47e406 54064->54067 54065 47e375 54068 403494 4 API calls 54065->54068 54066->54057 54066->54060 54070 402660 4 API calls 54066->54070 54067->54040 54068->54061 54071 47e394 54069->54071 54070->54066 54072 47e3bc MultiByteToWideChar 54071->54072 54072->54057 54073 47e271 54073->54066 54077 42e8b0 CharNextA 54073->54077 54075->54042 54076->54073 54077->54073 54078->54065 54080 46c8a5 54079->54080 54081 414af8 4 API calls 54080->54081 54091 46c8f2 54080->54091 54083 46c8bb 54081->54083 54082 403420 4 API calls 54084 46c99c 54082->54084 54278 4669cc 6 API calls 54083->54278 54084->53633 54270 408bf0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54084->54270 54086 46c8c3 54087 414b28 4 API calls 54086->54087 54088 46c8d1 54087->54088 54089 46c8de 54088->54089 54092 46c8f7 54088->54092 54279 47f454 43 API calls 54089->54279 54091->54082 54093 46c90f 54092->54093 54094 466ab0 CharNextA 54092->54094 54280 47f454 43 API calls 54093->54280 54096 46c90b 54094->54096 54096->54093 54097 46c925 54096->54097 54098 46c941 54097->54098 54099 46c92b 54097->54099 54101 42c9ac CharNextA 54098->54101 54281 47f454 43 API calls 54099->54281 54102 46c94e 54101->54102 54102->54091 54282 466b3c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54102->54282 54104 46c965 54105 4514cc 4 API calls 54104->54105 54106 46c972 54105->54106 54283 47f454 43 API calls 54106->54283 54109 4829e9 54108->54109 54110 4829bb 54108->54110 54112 47600c 54109->54112 54284 4953c4 18 API calls 54110->54284 54113 457db8 24 API calls 54112->54113 54114 476058 54113->54114 54115 4072b8 SetCurrentDirectoryA 54114->54115 54116 476062 54115->54116 54285 46e408 54116->54285 54120 476072 54293 45a1f0 54120->54293 54123 47c6f0 43 API calls 54124 4760c9 54123->54124 54126 4760d9 54124->54126 54715 4533b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54124->54715 54127 4760fb 54126->54127 54716 4533b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54126->54716 54129 479260 20 API calls 54127->54129 54130 476106 54129->54130 54297 47992c 54130->54297 54133 403450 4 API calls 54134 47612d 54133->54134 54135 403450 4 API calls 54134->54135 54136 47613b 54135->54136 54301 46eb5c 54136->54301 54271->53641 54278->54086 54279->54091 54280->54091 54281->54091 54282->54104 54283->54091 54284->54109 54286 46e47b 54285->54286 54288 46e425 54285->54288 54289 46e480 54286->54289 54287 479bdc 19 API calls 54287->54288 54288->54286 54288->54287 54290 46e4a6 54289->54290 54724 44fb90 54290->54724 54292 46e502 54292->54120 54294 45a1f6 54293->54294 54295 45a4d8 4 API calls 54294->54295 54296 45a212 54295->54296 54296->54123 54298 479939 54297->54298 54299 4797d4 19 API calls 54298->54299 54300 47610e 54298->54300 54299->54300 54300->54133 54302 46eb9a 54301->54302 54303 46eb8a 54301->54303 54305 403400 4 API calls 54302->54305 54304 403494 4 API calls 54303->54304 54306 46eb98 54304->54306 54305->54306 54307 455608 5 API calls 54306->54307 54308 46ebae 54307->54308 54309 455644 5 API calls 54308->54309 54310 46ebbc 54309->54310 54311 46eb34 5 API calls 54310->54311 54312 46ebd0 54311->54312 54313 45a2ac 4 API calls 54312->54313 54314 46ebe8 54313->54314 54315 403420 4 API calls 54314->54315 54316 46ec02 54315->54316 54317 403400 4 API calls 54316->54317 54318 46ec0a 54317->54318 54319 46ed68 54318->54319 54320 4034e0 4 API calls 54319->54320 54321 46eda5 54320->54321 54322 46edae 54321->54322 54715->54126 54716->54127 54727 44fba4 54724->54727 54728 44fbb5 54727->54728 54729 44fba1 54728->54729 54730 44fbdf MulDiv 54728->54730 54729->54292 54731 4181f0 54730->54731 54732 44fc0a SendMessageA 54731->54732 54732->54729 55840 431f60 55801->55840 55803 403400 4 API calls 55804 43daea 55803->55804 55804->53702 55804->53703 55805 43da66 55805->55803 55807 431c4a 55806->55807 55808 402648 4 API calls 55807->55808 55809 431c7a 55808->55809 55810 494ed0 55809->55810 55811 494fa5 55810->55811 55813 494eea 55810->55813 55817 494fe8 55811->55817 55813->55811 55814 433de0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55813->55814 55816 403450 4 API calls 55813->55816 55845 408c1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55813->55845 55846 431d14 55813->55846 55814->55813 55816->55813 55818 495004 55817->55818 55854 433de0 55818->55854 55820 495009 55821 431d14 4 API calls 55820->55821 55822 495014 55821->55822 55823 43d608 55822->55823 55824 43d635 55823->55824 55829 43d627 55823->55829 55824->53713 55825 43d6b1 55833 43d76b 55825->55833 55857 4470f8 55825->55857 55827 43d6fc 55863 43ddc4 55827->55863 55829->55824 55829->55825 55830 4470f8 4 API calls 55829->55830 55830->55829 55831 43d971 55831->55824 55883 447098 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55831->55883 55833->55831 55834 43d952 55833->55834 55881 447098 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55833->55881 55882 447098 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55834->55882 55837->53715 55838->53717 55839->53704 55841 403494 4 API calls 55840->55841 55843 431f6f 55841->55843 55842 431f99 55842->55805 55843->55842 55844 403744 4 API calls 55843->55844 55844->55843 55845->55813 55847 431d22 55846->55847 55848 431d34 55846->55848 55852 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55847->55852 55850 431d56 55848->55850 55853 431cb4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55848->55853 55850->55813 55852->55848 55853->55850 55855 402648 4 API calls 55854->55855 55856 433def 55855->55856 55856->55820 55858 447117 55857->55858 55859 44711e 55857->55859 55884 446ea4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55858->55884 55861 431d14 4 API calls 55859->55861 55862 44712e 55861->55862 55862->55827 55864 43dde0 55863->55864 55879 43de0d 55863->55879 55865 402660 4 API calls 55864->55865 55864->55879 55865->55864 55866 43de42 55866->55833 55868 43ff19 55868->55866 55889 447098 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55868->55889 55869 43c9ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55869->55879 55871 433b8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55871->55879 55873 447098 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55873->55879 55874 431cb4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55874->55879 55876 446ea4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55876->55879 55878 433d8c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55878->55879 55879->55866 55879->55868 55879->55869 55879->55871 55879->55873 55879->55874 55879->55876 55879->55878 55880 4366c4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55879->55880 55885 436ec0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55879->55885 55886 439754 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55879->55886 55887 43dcbc 18 API calls 55879->55887 55888 433da8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55879->55888 55880->55879 55881->55833 55882->55831 55883->55831 55884->55859 55885->55879 55886->55879 55887->55879 55888->55879 55889->55868 55890 42f594 55891 42f5a3 NtdllDefWindowProc_A 55890->55891 55892 42f59f 55890->55892 55891->55892 55893 435954 55894 435969 55893->55894 55898 435983 55894->55898 55899 43533c 55894->55899 55904 435386 55899->55904 55910 43536c 55899->55910 55900 403400 4 API calls 55901 43578b 55900->55901 55901->55898 55912 43579c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55901->55912 55902 446e18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55902->55910 55903 402648 4 API calls 55903->55910 55904->55900 55906 431d14 4 API calls 55906->55910 55907 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55907->55910 55908 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55908->55910 55909 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55909->55910 55910->55902 55910->55903 55910->55904 55910->55906 55910->55907 55910->55908 55910->55909 55913 434424 55910->55913 55925 434be8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55910->55925 55912->55898 55914 4344e1 55913->55914 55915 434451 55913->55915 55944 434384 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55914->55944 55916 403494 4 API calls 55915->55916 55918 43445f 55916->55918 55921 403778 4 API calls 55918->55921 55919 4344d3 55920 403400 4 API calls 55919->55920 55922 434531 55920->55922 55923 434480 55921->55923 55922->55910 55923->55919 55926 49501c 55923->55926 55925->55910 55927 4950ec 55926->55927 55928 495054 55926->55928 55945 4489a4 55927->55945 55929 403494 4 API calls 55928->55929 55933 49505f 55929->55933 55931 49506f 55932 403400 4 API calls 55931->55932 55934 495110 55932->55934 55933->55931 55936 4037b8 4 API calls 55933->55936 55935 403400 4 API calls 55934->55935 55937 495118 55935->55937 55938 495088 55936->55938 55937->55923 55938->55931 55939 4037b8 4 API calls 55938->55939 55940 4950ab 55939->55940 55941 403778 4 API calls 55940->55941 55942 4950dc 55941->55942 55943 403634 4 API calls 55942->55943 55943->55927 55944->55919 55946 4489c9 55945->55946 55956 448a0c 55945->55956 55947 403494 4 API calls 55946->55947 55951 4489d4 55947->55951 55948 448a20 55950 403400 4 API calls 55948->55950 55952 448a53 55950->55952 55953 4037b8 4 API calls 55951->55953 55952->55931 55954 4489f0 55953->55954 55955 4037b8 4 API calls 55954->55955 55955->55956 55956->55948 55957 4485a0 55956->55957 55958 403494 4 API calls 55957->55958 55959 4485d6 55958->55959 55960 4037b8 4 API calls 55959->55960 55961 4485e8 55960->55961 55962 403778 4 API calls 55961->55962 55963 448609 55962->55963 55964 4037b8 4 API calls 55963->55964 55965 448621 55964->55965 55966 403778 4 API calls 55965->55966 55967 44864c 55966->55967 55968 4037b8 4 API calls 55967->55968 55979 448664 55968->55979 55969 44869c 55971 403420 4 API calls 55969->55971 55970 448737 55974 44873f GetProcAddress 55970->55974 55975 44877c 55971->55975 55972 4486bf LoadLibraryExA 55972->55979 55973 4486d1 LoadLibraryA 55973->55979 55976 448752 55974->55976 55975->55948 55976->55969 55977 403b80 4 API calls 55977->55979 55978 403450 4 API calls 55978->55979 55979->55969 55979->55970 55979->55972 55979->55973 55979->55977 55979->55978 55981 43dafc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55979->55981 55981->55979 55982 44b51c 55983 44b52a 55982->55983 55985 44b549 55982->55985 55984 44b400 11 API calls 55983->55984 55983->55985 55984->55985 55986 44879c 55987 4487d1 55986->55987 55994 4487ca 55986->55994 55990 4485a0 7 API calls 55987->55990 55993 4487e5 55987->55993 55988 403494 4 API calls 55991 4487fe 55988->55991 55989 403400 4 API calls 55992 44897b 55989->55992 55990->55993 55995 4037b8 4 API calls 55991->55995 55993->55988 55993->55994 55994->55989 55996 44881a 55995->55996 55997 4037b8 4 API calls 55996->55997 55998 448836 55997->55998 55998->55994 55999 44884a 55998->55999 56000 4037b8 4 API calls 55999->56000 56001 448864 56000->56001 56002 431c44 4 API calls 56001->56002 56003 448886 56002->56003 56004 431d14 4 API calls 56003->56004 56009 4488a6 56003->56009 56004->56003 56005 4488fc 56018 4423a8 56005->56018 56007 4488e4 56007->56005 56030 443644 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56007->56030 56009->56007 56029 443644 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56009->56029 56011 448930 GetLastError 56031 448534 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56011->56031 56013 44893f 56032 443684 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56013->56032 56015 448954 56033 443694 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56015->56033 56017 44895c 56019 443386 56018->56019 56020 4423e1 56018->56020 56022 403400 4 API calls 56019->56022 56021 403400 4 API calls 56020->56021 56023 4423e9 56021->56023 56024 44339b 56022->56024 56025 431c44 4 API calls 56023->56025 56024->56011 56027 4423f5 56025->56027 56026 443376 56026->56011 56027->56026 56034 441a80 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56027->56034 56029->56009 56030->56005 56031->56013 56032->56015 56033->56017 56034->56027 56035 492dec 56036 492e20 56035->56036 56037 492e22 56036->56037 56038 492e36 56036->56038 56171 447010 18 API calls 56037->56171 56042 492e72 56038->56042 56043 492e45 56038->56043 56040 492e2b Sleep 56041 492e6d 56040->56041 56044 403420 4 API calls 56041->56044 56048 492eae 56042->56048 56049 492e81 56042->56049 56045 44706c 18 API calls 56043->56045 56046 4932e0 56044->56046 56047 492e54 56045->56047 56051 492e5c FindWindowA 56047->56051 56054 492ebd 56048->56054 56055 492f04 56048->56055 56050 44706c 18 API calls 56049->56050 56052 492e8e 56050->56052 56053 4472ec 5 API calls 56051->56053 56056 492e96 FindWindowA 56052->56056 56053->56041 56172 447010 18 API calls 56054->56172 56061 492f60 56055->56061 56062 492f13 56055->56062 56058 4472ec 5 API calls 56056->56058 56060 492ea9 56058->56060 56059 492ec9 56173 447010 18 API calls 56059->56173 56060->56041 56069 492fbc 56061->56069 56070 492f6f 56061->56070 56176 447010 18 API calls 56062->56176 56065 492ed6 56174 447010 18 API calls 56065->56174 56067 492f1f 56177 447010 18 API calls 56067->56177 56068 492ee3 56175 447010 18 API calls 56068->56175 56079 492fcb 56069->56079 56080 492ff6 56069->56080 56181 447010 18 API calls 56070->56181 56074 492f2c 56178 447010 18 API calls 56074->56178 56075 492eee SendMessageA 56078 4472ec 5 API calls 56075->56078 56076 492f7b 56182 447010 18 API calls 56076->56182 56078->56060 56084 44706c 18 API calls 56079->56084 56091 493005 56080->56091 56092 493044 56080->56092 56082 492f39 56179 447010 18 API calls 56082->56179 56087 492fd8 56084->56087 56085 492f88 56183 447010 18 API calls 56085->56183 56086 492f44 PostMessageA 56180 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56086->56180 56094 492fe0 RegisterClipboardFormatA 56087->56094 56090 492f95 56184 447010 18 API calls 56090->56184 56186 447010 18 API calls 56091->56186 56101 493098 56092->56101 56102 493053 56092->56102 56097 4472ec 5 API calls 56094->56097 56096 493011 56187 447010 18 API calls 56096->56187 56097->56041 56098 492fa0 SendNotifyMessageA 56185 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56098->56185 56108 4930ec 56101->56108 56109 4930a7 56101->56109 56189 447010 18 API calls 56102->56189 56103 49301e 56188 447010 18 API calls 56103->56188 56106 49305f 56190 447010 18 API calls 56106->56190 56107 493029 SendMessageA 56111 4472ec 5 API calls 56107->56111 56117 4930fb 56108->56117 56118 49314e 56108->56118 56193 447010 18 API calls 56109->56193 56111->56060 56113 49306c 56191 447010 18 API calls 56113->56191 56115 4930b3 56194 447010 18 API calls 56115->56194 56116 493077 PostMessageA 56192 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56116->56192 56121 44706c 18 API calls 56117->56121 56125 49315d 56118->56125 56126 4931d5 56118->56126 56123 493108 56121->56123 56122 4930c0 56195 447010 18 API calls 56122->56195 56127 42e3a4 2 API calls 56123->56127 56129 44706c 18 API calls 56125->56129 56136 49320a 56126->56136 56137 4931e4 56126->56137 56130 493115 56127->56130 56128 4930cb SendNotifyMessageA 56196 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56128->56196 56132 49316c 56129->56132 56133 49312b GetLastError 56130->56133 56134 49311b 56130->56134 56197 447010 18 API calls 56132->56197 56138 4472ec 5 API calls 56133->56138 56135 4472ec 5 API calls 56134->56135 56139 493129 56135->56139 56144 493219 56136->56144 56145 49323c 56136->56145 56202 447010 18 API calls 56137->56202 56138->56139 56143 4472ec 5 API calls 56139->56143 56142 4931ee FreeLibrary 56203 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56142->56203 56143->56041 56148 44706c 18 API calls 56144->56148 56154 49324b 56145->56154 56160 49327f 56145->56160 56146 49317f GetProcAddress 56149 49318b 56146->56149 56150 4931c5 56146->56150 56151 493225 56148->56151 56198 447010 18 API calls 56149->56198 56201 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56150->56201 56156 49322d CreateMutexA 56151->56156 56204 48d220 18 API calls 56154->56204 56155 493197 56199 447010 18 API calls 56155->56199 56156->56041 56159 4931a4 56163 4472ec 5 API calls 56159->56163 56160->56041 56206 48d220 18 API calls 56160->56206 56162 493257 56164 493268 OemToCharBuffA 56162->56164 56165 4931b5 56163->56165 56205 48d238 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56164->56205 56200 447144 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56165->56200 56168 49329a 56169 4932ab CharToOemBuffA 56168->56169 56207 48d238 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56169->56207 56171->56040 56172->56059 56173->56065 56174->56068 56175->56075 56176->56067 56177->56074 56178->56082 56179->56086 56180->56060 56181->56076 56182->56085 56183->56090 56184->56098 56185->56041 56186->56096 56187->56103 56188->56107 56189->56106 56190->56113 56191->56116 56192->56060 56193->56115 56194->56122 56195->56128 56196->56041 56197->56146 56198->56155 56199->56159 56200->56060 56201->56060 56202->56142 56203->56041 56204->56162 56205->56041 56206->56168 56207->56041 56208 41ee64 56209 41ee73 IsWindowVisible 56208->56209 56210 41eea9 56208->56210 56209->56210 56211 41ee7d IsWindowEnabled 56209->56211 56211->56210 56212 41ee87 56211->56212 56213 402648 4 API calls 56212->56213 56214 41ee91 EnableWindow 56213->56214 56214->56210 56215 41fb68 56216 41fb71 56215->56216 56219 41fe0c 56216->56219 56218 41fb7e 56220 41fefe 56219->56220 56221 41fe23 56219->56221 56220->56218 56221->56220 56240 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56221->56240 56223 41fe59 56224 41fe83 56223->56224 56225 41fe5d 56223->56225 56250 41f9cc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 56224->56250 56241 41fbac 56225->56241 56228 41fe91 56230 41fe95 56228->56230 56231 41febb 56228->56231 56234 41fbac 10 API calls 56230->56234 56235 41fbac 10 API calls 56231->56235 56232 41fbac 10 API calls 56233 41fe81 56232->56233 56233->56218 56236 41fea7 56234->56236 56237 41fecd 56235->56237 56238 41fbac 10 API calls 56236->56238 56239 41fbac 10 API calls 56237->56239 56238->56233 56239->56233 56240->56223 56242 41fbc7 56241->56242 56243 41fbdd 56242->56243 56244 41f94c 4 API calls 56242->56244 56251 41f94c 56243->56251 56244->56243 56246 41fc25 56247 41fc48 SetScrollInfo 56246->56247 56259 41faac 56247->56259 56250->56228 56252 4181f0 56251->56252 56253 41f969 GetWindowLongA 56252->56253 56254 41f9a6 56253->56254 56255 41f986 56253->56255 56271 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56254->56271 56270 41f8d8 GetWindowLongA GetSystemMetrics GetSystemMetrics 56255->56270 56258 41f992 56258->56246 56260 41faba 56259->56260 56261 41fac2 56259->56261 56260->56232 56262 41fb01 56261->56262 56263 41faf1 56261->56263 56269 41faff 56261->56269 56273 417e58 IsWindowVisible ScrollWindow SetWindowPos 56262->56273 56272 417e58 IsWindowVisible ScrollWindow SetWindowPos 56263->56272 56266 41fb41 GetScrollPos 56266->56260 56267 41fb4c 56266->56267 56268 41fb5b SetScrollPos 56267->56268 56268->56260 56269->56266 56270->56258 56271->56258 56272->56269 56273->56269 56274 4205a8 56275 4205bb 56274->56275 56295 415b40 56275->56295 56277 420702 56278 420719 56277->56278 56302 4146e4 KiUserCallbackDispatcher 56277->56302 56280 420730 56278->56280 56303 414728 KiUserCallbackDispatcher 56278->56303 56285 420752 56280->56285 56304 420070 12 API calls 56280->56304 56281 420661 56300 420858 20 API calls 56281->56300 56282 4205f6 56282->56277 56282->56281 56288 420652 MulDiv 56282->56288 56286 42067a 56286->56277 56301 420070 12 API calls 56286->56301 56299 41a314 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 56288->56299 56291 420697 56292 4206b3 MulDiv 56291->56292 56293 4206d6 56291->56293 56292->56293 56293->56277 56294 4206df MulDiv 56293->56294 56294->56277 56296 415b52 56295->56296 56305 414480 56296->56305 56298 415b6a 56298->56282 56299->56281 56300->56286 56301->56291 56302->56278 56303->56280 56304->56285 56306 41449a 56305->56306 56309 410468 56306->56309 56308 4144b0 56308->56298 56312 40dcb4 56309->56312 56311 41046e 56311->56308 56313 40dd16 56312->56313 56314 40dcc7 56312->56314 56319 40dd24 56313->56319 56317 40dd24 19 API calls 56314->56317 56318 40dcf1 56317->56318 56318->56311 56320 40dd34 56319->56320 56322 40dd4a 56320->56322 56331 40e0ac 56320->56331 56347 40d5f0 56320->56347 56350 40df5c 56322->56350 56325 40d5f0 5 API calls 56326 40dd52 56325->56326 56326->56325 56327 40ddbe 56326->56327 56353 40db70 56326->56353 56329 40df5c 5 API calls 56327->56329 56330 40dd20 56329->56330 56330->56311 56332 40e97c 5 API calls 56331->56332 56334 40e0e7 56332->56334 56333 403778 4 API calls 56333->56334 56334->56333 56335 40e19d 56334->56335 56420 40d784 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56334->56420 56421 40e090 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56334->56421 56336 40e1c7 56335->56336 56337 40e1b8 56335->56337 56417 40ba34 56336->56417 56367 40e3d0 56337->56367 56342 40e1c5 56344 403400 4 API calls 56342->56344 56345 40e26c 56344->56345 56345->56320 56348 40ea18 5 API calls 56347->56348 56349 40d5fa 56348->56349 56349->56320 56454 40d4cc 56350->56454 56354 40df64 5 API calls 56353->56354 56355 40dba3 56354->56355 56356 40e97c 5 API calls 56355->56356 56357 40dbae 56356->56357 56358 40e97c 5 API calls 56357->56358 56359 40dbb9 56358->56359 56360 40dbd4 56359->56360 56361 40dbcb 56359->56361 56366 40dbd1 56359->56366 56463 40d9e8 56360->56463 56466 40dad8 19 API calls 56361->56466 56364 403420 4 API calls 56365 40dc9f 56364->56365 56365->56326 56366->56364 56368 40e406 56367->56368 56369 40e3fc 56367->56369 56371 40e521 56368->56371 56372 40e4a5 56368->56372 56373 40e506 56368->56373 56374 40e586 56368->56374 56375 40e448 56368->56375 56376 40e4e9 56368->56376 56377 40e479 56368->56377 56378 40e4cb 56368->56378 56410 40e46c 56368->56410 56423 40d450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56369->56423 56379 40d774 5 API calls 56371->56379 56431 40de34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56372->56431 56436 40e8a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56373->56436 56385 40d774 5 API calls 56374->56385 56424 40d774 56375->56424 56434 40e9b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56376->56434 56377->56410 56430 40d828 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56377->56430 56433 40ddf4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56378->56433 56388 40e529 56379->56388 56381 403400 4 API calls 56389 40e5fb 56381->56389 56392 40e58e 56385->56392 56394 40e533 56388->56394 56404 40e52d 56388->56404 56389->56342 56390 40e4f4 56435 409d48 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56390->56435 56391 40e4b0 56432 40d480 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56391->56432 56397 40e592 56392->56397 56398 40e5ab 56392->56398 56437 40ea18 56394->56437 56406 40ea18 5 API calls 56397->56406 56443 40de34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56398->56443 56399 40e471 56429 40dee8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56399->56429 56400 40e454 56427 40de34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56400->56427 56408 40e531 56404->56408 56409 40ea18 5 API calls 56404->56409 56406->56410 56407 40e45f 56428 40e27c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56407->56428 56408->56410 56441 40de34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56408->56441 56413 40e554 56409->56413 56410->56381 56440 40d8b0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56413->56440 56414 40e576 56442 40e2e4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56414->56442 56449 40b9e0 56417->56449 56420->56334 56421->56334 56422 40d784 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56422->56342 56423->56368 56425 40ea18 5 API calls 56424->56425 56426 40d77e 56425->56426 56426->56399 56426->56400 56427->56407 56428->56410 56429->56377 56430->56410 56431->56391 56432->56410 56433->56410 56434->56390 56435->56410 56436->56410 56444 40d790 56437->56444 56440->56408 56441->56414 56442->56410 56443->56410 56447 40d79b 56444->56447 56445 40d7d5 56445->56410 56447->56445 56448 40d7dc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56447->56448 56448->56447 56450 40b9f2 56449->56450 56452 40ba17 56449->56452 56450->56452 56453 40ba94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56450->56453 56452->56342 56452->56422 56453->56452 56455 40ea18 5 API calls 56454->56455 56457 40d4d9 56455->56457 56456 40d4ec 56456->56326 56457->56456 56461 40eb1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56457->56461 56459 40d4e7 56462 40d468 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56459->56462 56461->56459 56462->56456 56467 40ab8c 19 API calls 56463->56467 56465 40da10 56465->56366 56466->56366 56467->56465 56468 480de4 56469 451078 5 API calls 56468->56469 56470 480df8 56469->56470 56471 47fe90 21 API calls 56470->56471 56472 480e1c 56471->56472 56473 480e7e 56474 480e87 56473->56474 56475 480eb1 56474->56475 56476 480e93 56474->56476 56851 47f7c0 24 API calls 56475->56851 56477 480ea8 56476->56477 56849 47f990 43 API calls 56476->56849 56850 47f7c0 24 API calls 56477->56850 56481 480eaf 56482 480ede 56481->56482 56483 480eec 56481->56483 56852 47708c 189 API calls 56482->56852 56485 480f2b 56483->56485 56854 47f928 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56483->56854 56484 480f4f 56491 480f61 56484->56491 56492 480f67 56484->56492 56485->56484 56488 480f42 56485->56488 56489 480f44 56485->56489 56499 47f96c 43 API calls 56488->56499 56856 47fa00 43 API calls 56489->56856 56490 480ee3 56490->56483 56853 408bf0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56490->56853 56495 480f65 56491->56495 56501 47f96c 43 API calls 56491->56501 56492->56495 56500 47f96c 43 API calls 56492->56500 56493 480f1e 56855 47f990 43 API calls 56493->56855 56608 47caf0 56495->56608 56499->56484 56500->56495 56501->56495 56502 480f8e 56682 47d018 56502->56682 56609 42d8a8 GetWindowsDirectoryA 56608->56609 56610 47cb14 56609->56610 56611 403450 4 API calls 56610->56611 56612 47cb21 56611->56612 56613 42d8d4 GetSystemDirectoryA 56612->56613 56614 47cb29 56613->56614 56615 403450 4 API calls 56614->56615 56616 47cb36 56615->56616 56617 42d900 6 API calls 56616->56617 56618 47cb3e 56617->56618 56619 403450 4 API calls 56618->56619 56620 47cb4b 56619->56620 56621 47cb54 56620->56621 56622 47cb70 56620->56622 56890 42d218 56621->56890 56623 403400 4 API calls 56622->56623 56625 47cb6e 56623->56625 56628 47cbb5 56625->56628 56629 42c8dc 5 API calls 56625->56629 56627 403450 4 API calls 56627->56625 56870 47c978 56628->56870 56631 47cb90 56629->56631 56633 403450 4 API calls 56631->56633 56636 47cb9d 56633->56636 56634 403450 4 API calls 56635 47cbd1 56634->56635 56637 47cbef 56635->56637 56638 4035c0 4 API calls 56635->56638 56636->56628 56640 403450 4 API calls 56636->56640 56639 47c978 8 API calls 56637->56639 56638->56637 56641 47cbfe 56639->56641 56640->56628 56642 403450 4 API calls 56641->56642 56643 47cc0b 56642->56643 56644 47cc33 56643->56644 56645 42c40c 5 API calls 56643->56645 56646 47cc9a 56644->56646 56649 47c978 8 API calls 56644->56649 56647 47cc21 56645->56647 56648 47cd62 56646->56648 56653 47ccba SHGetKnownFolderPath 56646->56653 56652 4035c0 4 API calls 56647->56652 56650 47cd8c 56648->56650 56651 47cd6b 56648->56651 56654 47cc4b 56649->56654 56657 42c40c 5 API calls 56650->56657 56656 42c40c 5 API calls 56651->56656 56652->56644 56658 47ccd4 56653->56658 56659 47cd0f SHGetKnownFolderPath 56653->56659 56655 403450 4 API calls 56654->56655 56660 47cc58 56655->56660 56662 47cd78 56656->56662 56663 47cd99 56657->56663 56900 403ba4 7 API calls 56658->56900 56659->56648 56661 47cd29 56659->56661 56666 47cc6b 56660->56666 56898 4533b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56660->56898 56901 403ba4 7 API calls 56661->56901 56668 4035c0 4 API calls 56662->56668 56669 4035c0 4 API calls 56663->56669 56665 47ccef CoTaskMemFree 56665->56502 56672 47c978 8 API calls 56666->56672 56673 47cd8a 56668->56673 56669->56673 56671 47cd44 CoTaskMemFree 56671->56502 56675 47cc7a 56672->56675 56881 47ca5c 56673->56881 56677 403450 4 API calls 56675->56677 56679 47cc87 56677->56679 56678 403400 4 API calls 56680 47cdc5 56678->56680 56679->56646 56899 4533b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56679->56899 56680->56502 56683 47d020 56682->56683 56683->56683 56903 453a98 56683->56903 56686 403450 4 API calls 56687 47d04d 56686->56687 56688 403494 4 API calls 56687->56688 56689 47d05a 56688->56689 56690 40357c 4 API calls 56689->56690 56691 47d068 56690->56691 56692 457db8 24 API calls 56691->56692 56693 47d070 56692->56693 56694 47d083 56693->56694 56933 4575b0 6 API calls 56693->56933 56696 42c40c 5 API calls 56694->56696 56697 47d090 56696->56697 56698 4035c0 4 API calls 56697->56698 56699 47d0a0 56698->56699 56700 47d0aa CreateDirectoryA 56699->56700 56701 47d0b4 GetLastError 56700->56701 56723 47d110 56700->56723 56702 4514cc 4 API calls 56701->56702 56704 47d0cc 56702->56704 56934 406d78 19 API calls 56704->56934 56705 47d11d 56707 47d146 56705->56707 56708 4035c0 4 API calls 56705->56708 56710 403420 4 API calls 56707->56710 56711 47d133 56708->56711 56709 47d0dc 56712 42e8d8 5 API calls 56709->56712 56713 47d160 56710->56713 56928 47cfc0 56711->56928 56715 47d0ec 56712->56715 56716 403420 4 API calls 56713->56716 56718 45149c 4 API calls 56715->56718 56719 47d16d 56716->56719 56721 47d101 56718->56721 56935 408c1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56721->56935 56921 4584b8 56723->56921 56849->56477 56850->56481 56851->56481 56852->56490 56854->56493 56855->56485 56856->56484 56871 42de2c RegOpenKeyExA 56870->56871 56872 47c99e 56871->56872 56873 47c9c4 56872->56873 56874 47c9a2 56872->56874 56876 403400 4 API calls 56873->56876 56875 42dd5c 6 API calls 56874->56875 56877 47c9ae 56875->56877 56878 47c9cb 56876->56878 56879 47c9b9 RegCloseKey 56877->56879 56880 403400 4 API calls 56877->56880 56878->56634 56879->56878 56880->56879 56882 47ca6a 56881->56882 56883 42de2c RegOpenKeyExA 56882->56883 56884 47ca92 56883->56884 56885 47cac3 56884->56885 56886 42dd5c 6 API calls 56884->56886 56885->56678 56887 47caa8 56886->56887 56888 42dd5c 6 API calls 56887->56888 56889 47caba RegCloseKey 56888->56889 56889->56885 56891 4038a4 4 API calls 56890->56891 56892 42d22b 56891->56892 56893 42d242 GetEnvironmentVariableA 56892->56893 56897 42d255 56892->56897 56902 42dbe0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56892->56902 56893->56892 56894 42d24e 56893->56894 56895 403400 4 API calls 56894->56895 56895->56897 56897->56627 56898->56666 56899->56646 56900->56665 56901->56671 56902->56892 56906 453ab8 56903->56906 56905 453824 11 API calls 56905->56906 56906->56905 56907 453add CreateDirectoryA 56906->56907 56912 4514cc 4 API calls 56906->56912 56918 42e8d8 5 API calls 56906->56918 56919 45149c 4 API calls 56906->56919 56937 42da28 56906->56937 56960 406d78 19 API calls 56906->56960 56961 408c1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56906->56961 56908 453b55 56907->56908 56909 453ae7 GetLastError 56907->56909 56910 403494 4 API calls 56908->56910 56909->56906 56911 453b5f 56910->56911 56913 403420 4 API calls 56911->56913 56912->56906 56914 453b79 56913->56914 56916 403420 4 API calls 56914->56916 56917 453b86 56916->56917 56917->56686 56918->56906 56919->56906 56922 4584c4 56921->56922 56923 4584d2 56921->56923 56924 403494 4 API calls 56922->56924 56925 403400 4 API calls 56923->56925 56926 4584d0 56924->56926 56927 4584d9 56925->56927 56926->56705 56927->56705 56929 40cf5c 23 API calls 56928->56929 56930 47cfdc 56929->56930 56933->56694 56934->56709 56935->56723 56938 42d218 5 API calls 56937->56938 56939 42da4e 56938->56939 56940 42da5a 56939->56940 56941 42cd58 7 API calls 56939->56941 56942 42d218 5 API calls 56940->56942 56944 42daa6 56940->56944 56941->56940 56943 42da6a 56942->56943 56945 42da76 56943->56945 56947 42cd58 7 API calls 56943->56947 56946 42c814 5 API calls 56944->56946 56945->56944 56950 42d218 5 API calls 56945->56950 56957 42da9b 56945->56957 56949 42dab0 56946->56949 56947->56945 56948 42d8a8 GetWindowsDirectoryA 56948->56944 56951 42c40c 5 API calls 56949->56951 56952 42da8f 56950->56952 56953 42dabb 56951->56953 56955 42cd58 7 API calls 56952->56955 56952->56957 56954 403494 4 API calls 56953->56954 56956 42dac5 56954->56956 56955->56957 56958 403420 4 API calls 56956->56958 56957->56944 56957->56948 56959 42dadf 56958->56959 56959->56906 56960->56906 56961->56906 58379 4222f4 58380 422303 58379->58380 58385 421284 58380->58385 58383 422323 58386 4212f3 58385->58386 58388 421293 58385->58388 58390 421304 58386->58390 58410 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58386->58410 58388->58386 58409 408d3c 19 API calls 58388->58409 58389 421332 58392 42134d 58389->58392 58398 4213a5 58389->58398 58390->58389 58391 4213ca 58390->58391 58394 4213de SetMenu 58391->58394 58407 4213a3 58391->58407 58402 421370 GetMenu 58392->58402 58392->58407 58393 4213f6 58413 4211cc 10 API calls 58393->58413 58394->58407 58397 4213fd 58397->58383 58408 4221f8 10 API calls 58397->58408 58399 4213b9 58398->58399 58398->58407 58401 4213c2 SetMenu 58399->58401 58401->58407 58403 421393 58402->58403 58404 42137a 58402->58404 58411 4124e0 GetMenuItemCount GetMenuStringA GetMenuState 58403->58411 58406 42138d SetMenu 58404->58406 58406->58403 58407->58393 58412 421e3c 11 API calls 58407->58412 58408->58383 58409->58388 58410->58390 58411->58407 58412->58393 58413->58397 58414 46e6bc 58415 46e6c7 58414->58415 58418 46e514 58415->58418 58419 46e53d 58418->58419 58420 46e55a 58419->58420 58421 44fba4 2 API calls 58419->58421 58428 46e26c 58420->58428 58421->58420 58423 46e5e9 58426 46e59f 58426->58423 58432 4953c4 18 API calls 58426->58432 58429 46e1e4 2 API calls 58428->58429 58430 46e27a 58429->58430 58430->58423 58431 495368 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 58430->58431 58431->58426 58432->58423 58433 4165fc DestroyWindow 58434 42e3ff SetErrorMode
                                                                                                                    Strings
                                                                                                                    • Dest file is protected by Windows File Protection., xrefs: 00470AE5
                                                                                                                    • Time stamp of existing file: %s, xrefs: 00470C23
                                                                                                                    • Existing file is a newer version. Skipping., xrefs: 00470DFA
                                                                                                                    • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 0047108E
                                                                                                                    • Will register the file (a type library) later., xrefs: 0047170B
                                                                                                                    • Will register the file (a DLL/OCX) later., xrefs: 00471717
                                                                                                                    • Stripped read-only attribute., xrefs: 004710BF
                                                                                                                    • @, xrefs: 004709A8
                                                                                                                    • Non-default bitness: 64-bit, xrefs: 00470AA7
                                                                                                                    • Couldn't read time stamp. Skipping., xrefs: 00470F2D
                                                                                                                    • Existing file has a later time stamp. Skipping., xrefs: 00470FC7
                                                                                                                    • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470EBC
                                                                                                                    • Incrementing shared file count (64-bit)., xrefs: 00471784
                                                                                                                    • Skipping due to "onlyifdoesntexist" flag., xrefs: 00470BC6
                                                                                                                    • User opted not to overwrite the existing file. Skipping., xrefs: 00471045
                                                                                                                    • Dest file exists., xrefs: 00470BB3
                                                                                                                    • Incrementing shared file count (32-bit)., xrefs: 0047179D
                                                                                                                    • Installing the file., xrefs: 00471101
                                                                                                                    • Uninstaller requires administrator: %s, xrefs: 00471387
                                                                                                                    • Time stamp of existing file: (failed to read), xrefs: 00470C2F
                                                                                                                    • Installing into GAC, xrefs: 0047190C
                                                                                                                    • Non-default bitness: 32-bit, xrefs: 00470AB3
                                                                                                                    • Version of our file: (none), xrefs: 00470CF4
                                                                                                                    • Time stamp of our file: (failed to read), xrefs: 00470B9F
                                                                                                                    • Same time stamp. Skipping., xrefs: 00470F4D
                                                                                                                    • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470FE4
                                                                                                                    • Same version. Skipping., xrefs: 00470EDD
                                                                                                                    • .tmp, xrefs: 004711AF
                                                                                                                    • -- File entry --, xrefs: 004708F3
                                                                                                                    • Version of our file: %u.%u.%u.%u, xrefs: 00470CE8
                                                                                                                    • Version of existing file: %u.%u.%u.%u, xrefs: 00470D74
                                                                                                                    • Time stamp of our file: %s, xrefs: 00470B93
                                                                                                                    • Version of existing file: (none), xrefs: 00470EF2
                                                                                                                    • Dest filename: %s, xrefs: 00470A8C
                                                                                                                    • Skipping due to "onlyifdestfileexists" flag., xrefs: 004710F2
                                                                                                                    • , xrefs: 00470DC7, 00470F98, 00471016
                                                                                                                    • InUn, xrefs: 00471357
                                                                                                                    • Failed to strip read-only attribute., xrefs: 004710CB
                                                                                                                    • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470EAD
                                                                                                                    • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470EC8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                                                    • API String ID: 0-4021121268
                                                                                                                    • Opcode ID: 9f2865767024a930b7916cd63da71f425be50596fff11d1e8904fa8c666432a3
                                                                                                                    • Instruction ID: 467263080efe338566352cc629e32221acf2e6aeb32e26e45aec936313cc1361
                                                                                                                    • Opcode Fuzzy Hash: 9f2865767024a930b7916cd63da71f425be50596fff11d1e8904fa8c666432a3
                                                                                                                    • Instruction Fuzzy Hash: AA927434A04288DFDB11DFA9C445BDDBBB4AF05304F1480ABE848BB392D7789E49DB59

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1578 42e0ac-42e0bd 1579 42e0c8-42e0ed AllocateAndInitializeSid 1578->1579 1580 42e0bf-42e0c3 1578->1580 1581 42e297-42e29f 1579->1581 1582 42e0f3-42e110 GetVersion 1579->1582 1580->1581 1583 42e112-42e127 GetModuleHandleA GetProcAddress 1582->1583 1584 42e129-42e12b 1582->1584 1583->1584 1585 42e152-42e16c GetCurrentThread OpenThreadToken 1584->1585 1586 42e12d-42e13b CheckTokenMembership 1584->1586 1589 42e1a3-42e1cb GetTokenInformation 1585->1589 1590 42e16e-42e178 GetLastError 1585->1590 1587 42e141-42e14d 1586->1587 1588 42e279-42e28f FreeSid 1586->1588 1587->1588 1593 42e1e6-42e20a call 402648 GetTokenInformation 1589->1593 1594 42e1cd-42e1d5 GetLastError 1589->1594 1591 42e184-42e197 GetCurrentProcess OpenProcessToken 1590->1591 1592 42e17a-42e17f call 4031bc 1590->1592 1591->1589 1597 42e199-42e19e call 4031bc 1591->1597 1592->1581 1604 42e218-42e220 1593->1604 1605 42e20c-42e216 call 4031bc * 2 1593->1605 1594->1593 1598 42e1d7-42e1e1 call 4031bc * 2 1594->1598 1597->1581 1598->1581 1609 42e222-42e223 1604->1609 1610 42e253-42e271 call 402660 CloseHandle 1604->1610 1605->1581 1614 42e225-42e238 EqualSid 1609->1614 1617 42e23a-42e247 1614->1617 1618 42e24f-42e251 1614->1618 1617->1618 1620 42e249-42e24d 1617->1620 1618->1610 1618->1614 1620->1610
                                                                                                                    APIs
                                                                                                                    • AllocateAndInitializeSid.ADVAPI32(0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0E6
                                                                                                                    • GetVersion.KERNEL32(00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E103
                                                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E11C
                                                                                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E122
                                                                                                                    • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E290,?,0049A788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E137
                                                                                                                    • FreeSid.ADVAPI32(00000000,0042E297,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E28A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                                                    • String ID: CheckTokenMembership$advapi32.dll
                                                                                                                    • API String ID: 2252812187-1888249752
                                                                                                                    • Opcode ID: 7c80af42b102e27edf5db655613db814b4685419315c422c8b7ce9c7c8cae370
                                                                                                                    • Instruction ID: b767a2b0357b006b48fec58faac565969e4e2695d2e87526588baf6f991b03ff
                                                                                                                    • Opcode Fuzzy Hash: 7c80af42b102e27edf5db655613db814b4685419315c422c8b7ce9c7c8cae370
                                                                                                                    • Instruction Fuzzy Hash: 99518371B44615EEEB10EAE6A842B7F7BACDB09304F9404BBB501F7282D5789904867D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1642 450334-450341 1643 450347-450354 GetVersion 1642->1643 1644 4503f0-4503fa 1642->1644 1643->1644 1645 45035a-450370 LoadLibraryA 1643->1645 1645->1644 1646 450372-4503eb GetProcAddress * 6 1645->1646 1646->1644
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32(00480FD9), ref: 00450347
                                                                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480FD9), ref: 0045035F
                                                                                                                    • GetProcAddress.KERNEL32(6F9D0000,RmStartSession), ref: 0045037D
                                                                                                                    • GetProcAddress.KERNEL32(6F9D0000,RmRegisterResources), ref: 00450392
                                                                                                                    • GetProcAddress.KERNEL32(6F9D0000,RmGetList), ref: 004503A7
                                                                                                                    • GetProcAddress.KERNEL32(6F9D0000,RmShutdown), ref: 004503BC
                                                                                                                    • GetProcAddress.KERNEL32(6F9D0000,RmRestart), ref: 004503D1
                                                                                                                    • GetProcAddress.KERNEL32(6F9D0000,RmEndSession), ref: 004503E6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoadVersion
                                                                                                                    • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                                                    • API String ID: 1968650500-3419246398
                                                                                                                    • Opcode ID: ba4799ed598e863f1006e140a948279c49c85d1dce31870895334632bea49e72
                                                                                                                    • Instruction ID: 01977ea06872d8050a8028e1fd06f6bfd4923f5c9242ba3c4897223f9bd4e12c
                                                                                                                    • Opcode Fuzzy Hash: ba4799ed598e863f1006e140a948279c49c85d1dce31870895334632bea49e72
                                                                                                                    • Instruction Fuzzy Hash: 2711C9B4550200DBD710FB79ADC5A2A32E4E765717F58163BB940AB1A3C67C4848CF2C

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1790 423c1c-423c50 1791 423c52-423c53 1790->1791 1792 423c84-423c9b call 423b78 1790->1792 1793 423c55-423c71 call 40b25c 1791->1793 1798 423cfc-423d01 1792->1798 1799 423c9d 1792->1799 1823 423c73-423c7b 1793->1823 1824 423c80-423c82 1793->1824 1802 423d03 1798->1802 1803 423d37-423d3c 1798->1803 1800 423ca3-423ca6 1799->1800 1801 423d60-423d70 1799->1801 1804 423cd5-423cd8 1800->1804 1805 423ca8 1800->1805 1808 423d72-423d77 1801->1808 1809 423d7b-423d83 call 4241a4 1801->1809 1811 423fc1-423fc9 1802->1811 1812 423d09-423d11 1802->1812 1806 423d42-423d45 1803->1806 1807 4240aa-4240b8 IsIconic 1803->1807 1817 423db9-423dc0 1804->1817 1818 423cde-423cdf 1804->1818 1813 423e06-423e16 call 423b94 1805->1813 1814 423cae-423cb1 1805->1814 1815 4240e6-4240fb call 424860 1806->1815 1816 423d4b-423d4c 1806->1816 1819 424162-42416a 1807->1819 1826 4240be-4240c9 GetFocus 1807->1826 1821 423d88-423d90 call 4241ec 1808->1821 1822 423d79-423d9c call 423b94 1808->1822 1809->1819 1811->1819 1820 423fcf-423fda call 4181f0 1811->1820 1827 423f23-423f4a SendMessageA 1812->1827 1828 423d17-423d1c 1812->1828 1813->1819 1830 423cb7-423cba 1814->1830 1831 423e2e-423e4a PostMessageA call 423b94 1814->1831 1815->1819 1841 423d52-423d55 1816->1841 1842 4240fd-424104 1816->1842 1817->1819 1833 423dc6-423dcd 1817->1833 1834 423ce5-423ce8 1818->1834 1835 423f4f-423f56 1818->1835 1840 424181-424187 1819->1840 1820->1819 1875 423fe0-423fef call 4181f0 IsWindowEnabled 1820->1875 1821->1819 1822->1819 1823->1840 1824->1792 1824->1793 1826->1819 1829 4240cf-4240d8 call 41f004 1826->1829 1827->1819 1837 423d22-423d23 1828->1837 1838 42405a-424065 1828->1838 1829->1819 1886 4240de-4240e4 SetFocus 1829->1886 1849 423cc0-423cc3 1830->1849 1850 423eb5-423ebc 1830->1850 1831->1819 1833->1819 1854 423dd3-423dd9 1833->1854 1855 423cee-423cf1 1834->1855 1856 423e4f-423e6f call 423b94 1834->1856 1835->1819 1865 423f5c-423f61 call 404e54 1835->1865 1858 424082-42408d 1837->1858 1859 423d29-423d2c 1837->1859 1838->1819 1861 42406b-42407d 1838->1861 1862 424130-424137 1841->1862 1863 423d5b 1841->1863 1852 424106-424119 call 4244e4 1842->1852 1853 42411b-42412e call 42453c 1842->1853 1868 423cc9-423cca 1849->1868 1869 423dde-423dec IsIconic 1849->1869 1870 423ebe-423ed1 call 423b24 1850->1870 1871 423eef-423f00 call 423b94 1850->1871 1852->1819 1853->1819 1854->1819 1873 423cf7 1855->1873 1874 423e1b-423e29 call 424188 1855->1874 1904 423e93-423eb0 call 423a94 PostMessageA 1856->1904 1905 423e71-423e8e call 423b24 PostMessageA 1856->1905 1858->1819 1882 424093-4240a5 1858->1882 1879 423d32 1859->1879 1880 423f66-423f6e 1859->1880 1861->1819 1877 42414a-424159 1862->1877 1878 424139-424148 1862->1878 1881 42415b-42415c call 423b94 1863->1881 1865->1819 1887 423cd0 1868->1887 1888 423da1-423da9 1868->1888 1894 423dfa-423e01 call 423b94 1869->1894 1895 423dee-423df5 call 423bd0 1869->1895 1919 423ee3-423eea call 423b94 1870->1919 1920 423ed3-423edd call 41ef68 1870->1920 1924 423f02-423f08 call 41eeb4 1871->1924 1925 423f16-423f1e call 423a94 1871->1925 1873->1881 1874->1819 1875->1819 1921 423ff5-424004 call 4181f0 IsWindowVisible 1875->1921 1877->1819 1878->1819 1879->1881 1880->1819 1901 423f74-423f7b 1880->1901 1912 424161 1881->1912 1882->1819 1886->1819 1887->1881 1888->1819 1906 423daf-423db4 call 422c5c 1888->1906 1894->1819 1895->1819 1901->1819 1903 423f81-423f90 call 4181f0 IsWindowEnabled 1901->1903 1903->1819 1935 423f96-423fac call 412320 1903->1935 1904->1819 1905->1819 1906->1819 1912->1819 1919->1819 1920->1919 1921->1819 1942 42400a-424055 GetFocus call 4181f0 SetFocus call 415250 SetFocus 1921->1942 1939 423f0d-423f10 1924->1939 1925->1819 1935->1819 1945 423fb2-423fbc 1935->1945 1939->1925 1942->1819 1945->1819
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 6031c6058a4147557a324cf51ffefd4fe9d2f91239d218d1be50ed81b108de41
                                                                                                                    • Instruction ID: e16ee7298f114c8dbeebd16f5ebee6ca6ec91daf226906b03d032974817fe50e
                                                                                                                    • Opcode Fuzzy Hash: 6031c6058a4147557a324cf51ffefd4fe9d2f91239d218d1be50ed81b108de41
                                                                                                                    • Instruction Fuzzy Hash: 87E1A130700224DFD704EF59E989A6EB7F5EB94304F9480A6E545AB352C73CEE91DB08
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00495FA4: GetWindowRect.USER32(00000000), ref: 00495FBA
                                                                                                                    • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 0046781B
                                                                                                                      • Part of subcall function 0041D6C0: GetObjectA.GDI32(?,00000018,00467835), ref: 0041D6EB
                                                                                                                      • Part of subcall function 00467228: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004672CB
                                                                                                                      • Part of subcall function 00467228: ExtractIconA.SHELL32(00400000,00000000,?), ref: 004672F1
                                                                                                                      • Part of subcall function 00467228: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467348
                                                                                                                      • Part of subcall function 00466BE8: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004678D0,00000000,00000000,00000000,0000000C,00000000), ref: 00466C00
                                                                                                                      • Part of subcall function 00496228: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00496232
                                                                                                                      • Part of subcall function 0042ED48: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                                                                      • Part of subcall function 0042ED48: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                                                                      • Part of subcall function 00495EF4: GetDC.USER32(00000000), ref: 00495F16
                                                                                                                      • Part of subcall function 00495EF4: SelectObject.GDI32(?,00000000), ref: 00495F3C
                                                                                                                      • Part of subcall function 00495EF4: ReleaseDC.USER32(00000000,?), ref: 00495F8D
                                                                                                                      • Part of subcall function 00496218: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00496222
                                                                                                                    • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,022AF378,022B10D8,?,?,022B1108,?,?,022B1158,?), ref: 004684BF
                                                                                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 004684D0
                                                                                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 004684E8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadProcRectReleaseSelectSystemUserWindow
                                                                                                                    • String ID: $(Default)$STOPIMAGE
                                                                                                                    • API String ID: 616467991-770201673
                                                                                                                    • Opcode ID: 87bcb674c8b66ef52b6acd084ab0e16fc1d5b69bf8698de0b4974f4e12f6faa5
                                                                                                                    • Instruction ID: 31ed69900cd485df966db968cea1a759f135fc149481760ad81ee09e41d161c5
                                                                                                                    • Opcode Fuzzy Hash: 87bcb674c8b66ef52b6acd084ab0e16fc1d5b69bf8698de0b4974f4e12f6faa5
                                                                                                                    • Instruction Fuzzy Hash: 5BF2C5786005209FCB00EB69D4D9F9973F1BF49304F1542BAE5049B36ADB78EC46CB9A
                                                                                                                    APIs
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 0047541D
                                                                                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 004754FA
                                                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0047552E,?,?,0049D1E0,00000000), ref: 00475508
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                                    • String ID: unins$unins???.*
                                                                                                                    • API String ID: 3541575487-1009660736
                                                                                                                    • Opcode ID: 223772387e8f10f3c6a78500543930a556b145fa8c6e4b5ce699a46b4d94e286
                                                                                                                    • Instruction ID: 94c2e66123b914be41fb9230d3e0bd96c7eed6bd52dd6cc9b7e2a75fa87f4789
                                                                                                                    • Opcode Fuzzy Hash: 223772387e8f10f3c6a78500543930a556b145fa8c6e4b5ce699a46b4d94e286
                                                                                                                    • Instruction Fuzzy Hash: 7D315370600558ABDB10EB69CD41BDEB7B9EF44304F5480B6A40CAB3A6DB78DF819B58
                                                                                                                    APIs
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00452B37,?,?,-00000001,00000000), ref: 00452B11
                                                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,00452B37,?,?,-00000001,00000000), ref: 00452B19
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileFindFirstLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 873889042-0
                                                                                                                    • Opcode ID: 62d728c2e18dd8ea61fe43d8693a083aa73a16905187bb3e16a058413067dfd1
                                                                                                                    • Instruction ID: 47a0ca8b87b913a19c884f83f9383acd825b8acbe58efe6d1ea2a1073528362f
                                                                                                                    • Opcode Fuzzy Hash: 62d728c2e18dd8ea61fe43d8693a083aa73a16905187bb3e16a058413067dfd1
                                                                                                                    • Instruction Fuzzy Hash: 69F04931A00604AB8B10DF6A9D4189EF7ACEB4632171042BBFC14E3292DAB85E048558
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32(00000386,0046E27A), ref: 0046E1EE
                                                                                                                    • CoCreateInstance.OLE32(0049AB98,00000000,00000001,0049ABA8,?,00000386,0046E27A), ref: 0046E20A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateInstanceVersion
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1462612201-0
                                                                                                                    • Opcode ID: a4af8d076fcecf17adfdc3d0480ff287c2d0b6366a88815b83ba2acce94f7983
                                                                                                                    • Instruction ID: 2583b72e9ff3fb42948badd432de3b99868d7e942e7e47a623e6463d1fe0ae05
                                                                                                                    • Opcode Fuzzy Hash: a4af8d076fcecf17adfdc3d0480ff287c2d0b6366a88815b83ba2acce94f7983
                                                                                                                    • Instruction Fuzzy Hash: 58F0E5346412009EFB10E77AEC46B4A37CAAB21319F5004BBF144A7292E2ACE495870F
                                                                                                                    APIs
                                                                                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2299586839-0
                                                                                                                    • Opcode ID: eb14f04c5e02207c2fd5126442fac2e3d3ce4c3ff781734da4d02da34a9f601e
                                                                                                                    • Instruction ID: 7c1c2e54cb9be6942265fc2fe4f8d610b96419e03c3bde54798e363261146e82
                                                                                                                    • Opcode Fuzzy Hash: eb14f04c5e02207c2fd5126442fac2e3d3ce4c3ff781734da4d02da34a9f601e
                                                                                                                    • Instruction Fuzzy Hash: D1E09271700614A6D311A95A9C86AEAB35C9B68314F00427FB944E73C6EDB89E4046E9
                                                                                                                    APIs
                                                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424161,?,00000000,0042416C), ref: 00423BBE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: NtdllProc_Window
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4255912815-0
                                                                                                                    • Opcode ID: 1e03a0b95ee3ac50814388fded2f2c100431d5d137ce34ba8ee35217fcdc3973
                                                                                                                    • Instruction ID: 626c949ff67c0b5daba62b8ffba664747ea83a29b03f4787c3cb7294a8149fcf
                                                                                                                    • Opcode Fuzzy Hash: 1e03a0b95ee3ac50814388fded2f2c100431d5d137ce34ba8ee35217fcdc3973
                                                                                                                    • Instruction Fuzzy Hash: 9CF0B379205608AF8B40DF99C588D4ABBE8AB4C260B058295B988CB321C234EE808F94
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: NameUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2645101109-0
                                                                                                                    • Opcode ID: b729cb2c5e6aed0314aaf1ae3f51ea3427620088d531228546b40ff94aa38a59
                                                                                                                    • Instruction ID: 1d2ebe8de6f6cfe3948c3fff4a7e090af1b7aca458264ab6234f43f9cc1e19d2
                                                                                                                    • Opcode Fuzzy Hash: b729cb2c5e6aed0314aaf1ae3f51ea3427620088d531228546b40ff94aa38a59
                                                                                                                    • Instruction Fuzzy Hash: 94D0C2B130460063D700AA689C926AA368C8B84345F00483E3CC9DA2D3EABDDA48169A
                                                                                                                    APIs
                                                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F5B0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: NtdllProc_Window
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4255912815-0
                                                                                                                    • Opcode ID: 0f3603468c344ce3f2e9376b2c090f409274960c84c57a5106e539cc1743996a
                                                                                                                    • Instruction ID: 438f9cd868ded5fa8976115e55c89a445960fd054612ac8023f685210e8cb482
                                                                                                                    • Opcode Fuzzy Hash: 0f3603468c344ce3f2e9376b2c090f409274960c84c57a5106e539cc1743996a
                                                                                                                    • Instruction Fuzzy Hash: 52D09E7221010DBB9B00DE99D840D6B33AD9B88754B908925F545C7346D634ED619BB5

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 844 46f250-46f282 845 46f284-46f28b 844->845 846 46f29f 844->846 847 46f296-46f29d 845->847 848 46f28d-46f294 845->848 849 46f2a6-46f2de call 403634 call 403738 call 42ded0 846->849 847->849 848->846 848->847 856 46f2e0-46f2f4 call 403738 call 42ded0 849->856 857 46f2f9-46f322 call 403738 call 42ddf4 849->857 856->857 865 46f324-46f32d call 46ef20 857->865 866 46f332-46f35b call 46f03c 857->866 865->866 870 46f36d-46f370 call 403400 866->870 871 46f35d-46f36b call 403494 866->871 875 46f375-46f3c0 call 46f03c call 42c40c call 46f084 call 46f03c 870->875 871->875 884 46f3d6-46f3f7 call 455644 call 46f03c 875->884 885 46f3c2-46f3d5 call 46f0ac 875->885 892 46f44d-46f454 884->892 893 46f3f9-46f44c call 46f03c call 431478 call 46f03c call 431478 call 46f03c 884->893 885->884 894 46f456-46f493 call 431478 call 46f03c call 431478 call 46f03c 892->894 895 46f494-46f49b 892->895 893->892 894->895 897 46f4dc-46f501 call 40b25c call 46f03c 895->897 898 46f49d-46f4db call 46f03c * 3 895->898 919 46f503-46f50e call 47c6f0 897->919 920 46f510-46f519 call 403494 897->920 898->897 927 46f51e-46f529 call 479240 919->927 920->927 934 46f532 927->934 935 46f52b-46f530 927->935 936 46f537-46f701 call 403778 call 46f03c call 47c6f0 call 46f084 call 403494 call 40357c * 2 call 46f03c call 403494 call 40357c * 2 call 46f03c call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 call 46f084 call 47c6f0 934->936 935->936 999 46f717-46f725 call 46f0ac 936->999 1000 46f703-46f715 call 46f03c 936->1000 1004 46f72a 999->1004 1005 46f72b-46f774 call 46f0ac call 46f0e0 call 46f03c call 47c6f0 call 46f144 1000->1005 1004->1005 1016 46f776-46f799 call 46f0ac * 2 1005->1016 1017 46f79a-46f7a7 1005->1017 1016->1017 1019 46f876-46f87d 1017->1019 1020 46f7ad-46f7b4 1017->1020 1021 46f8d7-46f8ed RegCloseKey 1019->1021 1022 46f87f-46f8b5 call 4953c4 1019->1022 1024 46f7b6-46f7bd 1020->1024 1025 46f821-46f830 1020->1025 1022->1021 1024->1025 1029 46f7bf-46f7e3 call 430c40 1024->1029 1028 46f833-46f840 1025->1028 1032 46f857-46f870 call 430c7c call 46f0ac 1028->1032 1033 46f842-46f84f 1028->1033 1029->1028 1039 46f7e5-46f7e6 1029->1039 1042 46f875 1032->1042 1033->1032 1037 46f851-46f855 1033->1037 1037->1019 1037->1032 1041 46f7e8-46f80e call 40b25c call 479a9c 1039->1041 1047 46f810-46f816 call 430c40 1041->1047 1048 46f81b-46f81d 1041->1048 1042->1019 1047->1048 1048->1041 1050 46f81f 1048->1050 1050->1028
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0046F03C: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,JfG,?,0049D1E0,?,0046F353,?,00000000,0046F8EE,?,_is1), ref: 0046F05F
                                                                                                                      • Part of subcall function 0046F0AC: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F72A,?,?,00000000,0046F8EE,?,_is1,?), ref: 0046F0BF
                                                                                                                    • RegCloseKey.ADVAPI32(?,0046F8F5,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F940,?,?,0049D1E0,00000000), ref: 0046F8E8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Value$Close
                                                                                                                    • String ID: " /SILENT$5.5.6 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                                                    • API String ID: 3391052094-4001681900
                                                                                                                    • Opcode ID: 0c8f29f64bdd0ecd06bbcfcfee9d93e2977bfa718a38598d02fb25eda312bb98
                                                                                                                    • Instruction ID: 2d81112130bbfcb2548f8b376684fbb7cc3ec4c1e14eddd466eba1ede3ae6ff4
                                                                                                                    • Opcode Fuzzy Hash: 0c8f29f64bdd0ecd06bbcfcfee9d93e2977bfa718a38598d02fb25eda312bb98
                                                                                                                    • Instruction Fuzzy Hash: DD126735A001089BCB14EF55F881ADE73F5EB48304F60817BE854AB396EB78BD49CB59

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1051 492dec-492e20 call 403684 1054 492e22-492e31 call 447010 Sleep 1051->1054 1055 492e36-492e43 call 403684 1051->1055 1060 4932c6-4932e0 call 403420 1054->1060 1061 492e72-492e7f call 403684 1055->1061 1062 492e45-492e68 call 44706c call 403738 FindWindowA call 4472ec 1055->1062 1069 492eae-492ebb call 403684 1061->1069 1070 492e81-492ea9 call 44706c call 403738 FindWindowA call 4472ec 1061->1070 1081 492e6d 1062->1081 1079 492ebd-492eff call 447010 * 4 SendMessageA call 4472ec 1069->1079 1080 492f04-492f11 call 403684 1069->1080 1070->1060 1079->1060 1089 492f60-492f6d call 403684 1080->1089 1090 492f13-492f5b call 447010 * 4 PostMessageA call 447144 1080->1090 1081->1060 1099 492fbc-492fc9 call 403684 1089->1099 1100 492f6f-492fb7 call 447010 * 4 SendNotifyMessageA call 447144 1089->1100 1090->1060 1111 492fcb-492ff1 call 44706c call 403738 RegisterClipboardFormatA call 4472ec 1099->1111 1112 492ff6-493003 call 403684 1099->1112 1100->1060 1111->1060 1127 493005-49303f call 447010 * 3 SendMessageA call 4472ec 1112->1127 1128 493044-493051 call 403684 1112->1128 1127->1060 1141 493098-4930a5 call 403684 1128->1141 1142 493053-493093 call 447010 * 3 PostMessageA call 447144 1128->1142 1151 4930ec-4930f9 call 403684 1141->1151 1152 4930a7-4930e7 call 447010 * 3 SendNotifyMessageA call 447144 1141->1152 1142->1060 1163 4930fb-493119 call 44706c call 42e3a4 1151->1163 1164 49314e-49315b call 403684 1151->1164 1152->1060 1183 49312b-493139 GetLastError call 4472ec 1163->1183 1184 49311b-493129 call 4472ec 1163->1184 1174 49315d-493189 call 44706c call 403738 call 447010 GetProcAddress 1164->1174 1175 4931d5-4931e2 call 403684 1164->1175 1208 49318b-4931c0 call 447010 * 2 call 4472ec call 447144 1174->1208 1209 4931c5-4931d0 call 447144 1174->1209 1189 49320a-493217 call 403684 1175->1189 1190 4931e4-493205 call 447010 FreeLibrary call 447144 1175->1190 1196 49313e-493149 call 4472ec 1183->1196 1184->1196 1201 493219-493237 call 44706c call 403738 CreateMutexA 1189->1201 1202 49323c-493249 call 403684 1189->1202 1190->1060 1196->1060 1201->1060 1217 49324b-49327d call 48d220 call 403574 call 403738 OemToCharBuffA call 48d238 1202->1217 1218 49327f-49328c call 403684 1202->1218 1208->1060 1209->1060 1217->1060 1227 49328e-4932c0 call 48d220 call 403574 call 403738 CharToOemBuffA call 48d238 1218->1227 1228 4932c2 1218->1228 1227->1060 1228->1060
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(00000000,00000000,004932E1,?,?,?,?,00000000,00000000,00000000), ref: 00492E2C
                                                                                                                    • FindWindowA.USER32(00000000,00000000), ref: 00492E5D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FindSleepWindow
                                                                                                                    • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                                                    • API String ID: 3078808852-3310373309
                                                                                                                    • Opcode ID: ab981dd30d0aee45c05a3b051f24ce0c537323c16054c62714ac7cac7fc0af63
                                                                                                                    • Instruction ID: 0de698378398c76d082fe6c781760205a02602346193583708d777b6c814c377
                                                                                                                    • Opcode Fuzzy Hash: ab981dd30d0aee45c05a3b051f24ce0c537323c16054c62714ac7cac7fc0af63
                                                                                                                    • Instruction Fuzzy Hash: C9C18360B0821067DB14BF7E8C4261E5A999F99B05710CD7FB446EB38BCE3DDE0A425D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1621 483f60-483f85 GetModuleHandleA GetProcAddress 1622 483fec-483ff1 GetSystemInfo 1621->1622 1623 483f87-483f9d GetNativeSystemInfo GetProcAddress 1621->1623 1625 483ff6-483fff 1622->1625 1624 483f9f-483faa GetCurrentProcess 1623->1624 1623->1625 1624->1625 1634 483fac-483fb0 1624->1634 1626 48400f-484016 1625->1626 1627 484001-484005 1625->1627 1630 484031-484036 1626->1630 1628 484018-48401f 1627->1628 1629 484007-48400b 1627->1629 1628->1630 1632 48400d-48402a 1629->1632 1633 484021-484028 1629->1633 1632->1630 1633->1630 1634->1625 1636 483fb2-483fb9 call 452790 1634->1636 1636->1625 1639 483fbb-483fc8 GetProcAddress 1636->1639 1639->1625 1640 483fca-483fe1 GetModuleHandleA GetProcAddress 1639->1640 1640->1625 1641 483fe3-483fea 1640->1641 1641->1625
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483F71
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483F7E
                                                                                                                    • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483F8C
                                                                                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483F94
                                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483FA0
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483FC1
                                                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483FD4
                                                                                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483FDA
                                                                                                                    • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483FF1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                                                    • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                                                    • API String ID: 2230631259-2623177817
                                                                                                                    • Opcode ID: 2201496c5c445ff8090de454bf6ebb37dd8ee277a0fffd9fa5a8cd1afd0d38d8
                                                                                                                    • Instruction ID: debdefcd9c900846d3217bdd74a69f8d0e186994afde8710a0eb2db1caaea97a
                                                                                                                    • Opcode Fuzzy Hash: 2201496c5c445ff8090de454bf6ebb37dd8ee277a0fffd9fa5a8cd1afd0d38d8
                                                                                                                    • Instruction Fuzzy Hash: 9E11E95180C74391D62177784C0676F2A988B92B59F080C377F80692C3DEBCC989A3AF

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1647 468e4c-468e84 call 47c6f0 1650 469066-469080 call 403420 1647->1650 1651 468e8a-468e9a call 479260 1647->1651 1656 468e9f-468ee4 call 407904 call 403738 call 42de2c 1651->1656 1662 468ee9-468eeb 1656->1662 1663 468ef1-468f06 1662->1663 1664 46905c-469060 1662->1664 1665 468f1b-468f22 1663->1665 1666 468f08-468f16 call 42dd5c 1663->1666 1664->1650 1664->1656 1668 468f24-468f46 call 42dd5c call 42dd74 1665->1668 1669 468f4f-468f56 1665->1669 1666->1665 1668->1669 1688 468f48 1668->1688 1671 468faf-468fb6 1669->1671 1672 468f58-468f7d call 42dd5c * 2 1669->1672 1674 468ffc-469003 1671->1674 1675 468fb8-468fca call 42dd5c 1671->1675 1692 468f7f-468f88 call 43156c 1672->1692 1693 468f8d-468f9f call 42dd5c 1672->1693 1677 469005-469039 call 42dd5c * 3 1674->1677 1678 46903e-469054 RegCloseKey 1674->1678 1689 468fcc-468fd5 call 43156c 1675->1689 1690 468fda-468fec call 42dd5c 1675->1690 1677->1678 1688->1669 1689->1690 1690->1674 1700 468fee-468ff7 call 43156c 1690->1700 1692->1693 1693->1671 1704 468fa1-468faa call 43156c 1693->1704 1700->1674 1704->1671
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(?,00469066,?,?,00000001,00000000,00000000,00469081,?,00000000,00000000,?), ref: 0046904F
                                                                                                                    Strings
                                                                                                                    • Inno Setup: Selected Components, xrefs: 00468F6E
                                                                                                                    • Inno Setup: User Info: Serial, xrefs: 00469031
                                                                                                                    • Inno Setup: App Path, xrefs: 00468F0E
                                                                                                                    • Inno Setup: Selected Tasks, xrefs: 00468FBB
                                                                                                                    • Inno Setup: Icon Group, xrefs: 00468F2A
                                                                                                                    • Inno Setup: Deselected Components, xrefs: 00468F90
                                                                                                                    • Inno Setup: User Info: Organization, xrefs: 0046901E
                                                                                                                    • %s\%s_is1, xrefs: 00468EC9
                                                                                                                    • Inno Setup: Deselected Tasks, xrefs: 00468FDD
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468EAB
                                                                                                                    • Inno Setup: User Info: Name, xrefs: 0046900B
                                                                                                                    • Inno Setup: Setup Type, xrefs: 00468F5E
                                                                                                                    • Inno Setup: No Icons, xrefs: 00468F37
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                                                    • API String ID: 47109696-1093091907
                                                                                                                    • Opcode ID: 3126083cf3be9c39a66cdbe20af93384c1cff4aeea9d1100fba6d94b6d1288bc
                                                                                                                    • Instruction ID: ec004eca3ef3c75e9be151f7b3ffcc37546afe520acb5c6156e930094c0c3bde
                                                                                                                    • Opcode Fuzzy Hash: 3126083cf3be9c39a66cdbe20af93384c1cff4aeea9d1100fba6d94b6d1288bc
                                                                                                                    • Instruction Fuzzy Hash: CA51C630A006089FDB15DB65D941BDEB7F9EF49304F6084ABE840673A1E7786F05CB4A

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042D8A8: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453E28,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D), ref: 0042D8BB
                                                                                                                      • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                                                      • Part of subcall function 0042D900: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453BCE,00000000,00453C71,?,?,00000000,00000000,00000000,00000000,00000000,?,00454061,00000000), ref: 0042D91A
                                                                                                                      • Part of subcall function 0042D900: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                                                                    • SHGetKnownFolderPath.SHELL32(0049AD30,00008000,00000000,?,00000000,0047CDC6), ref: 0047CCCA
                                                                                                                    • CoTaskMemFree.OLE32(?,0047CD0F), ref: 0047CD02
                                                                                                                      • Part of subcall function 0042D218: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA4E,00000000,0042DAE0,?,?,?,0049C628,00000000,00000000), ref: 0042D243
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                                                                    • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                                                    • API String ID: 3771764029-544719455
                                                                                                                    • Opcode ID: c632660a73aa2456bea4c2f675731a15cac3be8b36c890987e871e9594b1d94f
                                                                                                                    • Instruction ID: 266a5e1eeddd24a6ff800b9f6f3b1db768c176bc66f8c93c3bb1332691642a31
                                                                                                                    • Opcode Fuzzy Hash: c632660a73aa2456bea4c2f675731a15cac3be8b36c890987e871e9594b1d94f
                                                                                                                    • Instruction Fuzzy Hash: 5C61A235A00204AFDB20FBA5E882A8E7F69EB45718F50C47FE448A7395C73C9A45CB5D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 2060 47d2fc-47d352 call 42c40c call 4035c0 call 47cfc0 call 45264c 2069 47d354-47d359 call 4533b8 2060->2069 2070 47d35e-47d36d call 45264c 2060->2070 2069->2070 2074 47d387-47d38d 2070->2074 2075 47d36f-47d375 2070->2075 2076 47d3a4-47d3cc call 42e3a4 * 2 2074->2076 2077 47d38f-47d395 2074->2077 2078 47d397-47d39f call 403494 2075->2078 2079 47d377-47d37d 2075->2079 2086 47d3f3-47d40d GetProcAddress 2076->2086 2087 47d3ce-47d3ee call 407904 call 4533b8 2076->2087 2077->2076 2077->2078 2078->2076 2079->2074 2082 47d37f-47d385 2079->2082 2082->2074 2082->2078 2089 47d40f-47d414 call 4533b8 2086->2089 2090 47d419-47d436 call 403400 * 2 2086->2090 2087->2086 2089->2090
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(73AF0000,SHGetFolderPathA), ref: 0047D3FE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc
                                                                                                                    • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                                                    • API String ID: 190572456-1343262939
                                                                                                                    • Opcode ID: 4cc01edd127e64cd0f82a92db32c63990836159403836ae159d58d169a80421c
                                                                                                                    • Instruction ID: d045dd866038c92064cf829f06b82d6aceddf0eaafaeaf0ab83e85e2faf6b2a6
                                                                                                                    • Opcode Fuzzy Hash: 4cc01edd127e64cd0f82a92db32c63990836159403836ae159d58d169a80421c
                                                                                                                    • Instruction Fuzzy Hash: 67311B70E10149AFCB10EFA9D9819EEB7B5EF44319F50847BE848E7341D738AE058B69

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 2098 40632c-406346 GetModuleHandleA GetProcAddress 2099 406348 2098->2099 2100 40634f-40635c GetProcAddress 2098->2100 2099->2100 2101 406365-406372 GetProcAddress 2100->2101 2102 40635e 2100->2102 2103 406374-406376 SetProcessDEPPolicy 2101->2103 2104 406378-406379 2101->2104 2102->2101 2103->2104
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00499298), ref: 00406332
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040633F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406355
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040636B
                                                                                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00499298), ref: 00406376
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                                                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                                                    • API String ID: 3256987805-3653653586
                                                                                                                    • Opcode ID: 7d7bbe465618e4585c438ef3b206e32c98bc9d4bad24831f1f4b353394e5164f
                                                                                                                    • Instruction ID: 9a8e57213fbd449cbda58cf554ac4ead7a6b18060d135b7a086c7f718c4e9984
                                                                                                                    • Opcode Fuzzy Hash: 7d7bbe465618e4585c438ef3b206e32c98bc9d4bad24831f1f4b353394e5164f
                                                                                                                    • Instruction Fuzzy Hash: C6E02DA1380701A8EA1032B20D82F3B104C8B40B69B2A24377D96B45C7DABEDD6455BD

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 2105 423884-42388e 2106 4239b7-4239bb 2105->2106 2107 423894-4238b6 call 41f3d4 GetClassInfoA 2105->2107 2110 4238e7-4238f0 GetSystemMetrics 2107->2110 2111 4238b8-4238cf RegisterClassA 2107->2111 2112 4238f2 2110->2112 2113 4238f5-4238ff GetSystemMetrics 2110->2113 2111->2110 2114 4238d1-4238e2 call 408ccc call 40311c 2111->2114 2112->2113 2115 423901 2113->2115 2116 423904-423960 call 403738 call 4062f8 call 403400 call 42365c SetWindowLongA 2113->2116 2114->2110 2115->2116 2128 423962-423975 call 424188 SendMessageA 2116->2128 2129 42397a-4239a8 GetSystemMenu DeleteMenu * 2 2116->2129 2128->2129 2129->2106 2130 4239aa-4239b2 DeleteMenu 2129->2130 2130->2106
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041F3D4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                                                    • GetClassInfoA.USER32(00400000,0042368C), ref: 004238AF
                                                                                                                    • RegisterClassA.USER32(0049A630), ref: 004238C7
                                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 004238E9
                                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 004238F8
                                                                                                                    • SetWindowLongA.USER32(00410470,000000FC,0042369C), ref: 00423954
                                                                                                                    • SendMessageA.USER32(00410470,00000080,00000001,00000000), ref: 00423975
                                                                                                                    • GetSystemMenu.USER32(00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 00423980
                                                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C,0041EDB4), ref: 0042398F
                                                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042399C
                                                                                                                    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410470,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239B2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 183575631-0
                                                                                                                    • Opcode ID: dcf1e4bb608db0b13c9ea2834524852589dee19fdd42878d22a9146a5775872e
                                                                                                                    • Instruction ID: 82f3192e6ade9fc2431bdc17690f87bdde911e200ecbc62aa143bb8a1c16cd18
                                                                                                                    • Opcode Fuzzy Hash: dcf1e4bb608db0b13c9ea2834524852589dee19fdd42878d22a9146a5775872e
                                                                                                                    • Instruction Fuzzy Hash: A93177B17402106AE710BFA5DC82F6636989714709F54017BFA44EF2D7C6BDED40876D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 2133 42f5d4-42f5de 2134 42f5e0-42f5e3 call 402d30 2133->2134 2135 42f5e8-42f625 call 402b30 GetActiveWindow GetFocus call 41eeb4 2133->2135 2134->2135 2141 42f637-42f63f 2135->2141 2142 42f627-42f631 RegisterClassA 2135->2142 2143 42f6c6-42f6e2 SetFocus call 403400 2141->2143 2144 42f645-42f676 CreateWindowExA 2141->2144 2142->2141 2144->2143 2145 42f678-42f6bc call 42428c call 403738 CreateWindowExA 2144->2145 2145->2143 2152 42f6be-42f6c1 ShowWindow 2145->2152 2152->2143
                                                                                                                    APIs
                                                                                                                    • GetActiveWindow.USER32 ref: 0042F603
                                                                                                                    • GetFocus.USER32 ref: 0042F60B
                                                                                                                    • RegisterClassA.USER32(0049A7AC), ref: 0042F62C
                                                                                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F700,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F66A
                                                                                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F6B0
                                                                                                                    • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F6C1
                                                                                                                    • SetFocus.USER32(00000000,00000000,0042F6E3,?,?,?,00000001,00000000,?,004583FA,00000000,0049C628), ref: 0042F6C8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                                                    • String ID: TWindowDisabler-Window
                                                                                                                    • API String ID: 3167913817-1824977358
                                                                                                                    • Opcode ID: 329e45f8b9a76be32e2a3852da0fb01f5e5fb6a649be07f73332a055a5178ca6
                                                                                                                    • Instruction ID: d29da226113d58e61871af9e0701154b32a21c5c31e3c64538275018e3c6a7a6
                                                                                                                    • Opcode Fuzzy Hash: 329e45f8b9a76be32e2a3852da0fb01f5e5fb6a649be07f73332a055a5178ca6
                                                                                                                    • Instruction Fuzzy Hash: 35219771740710BAE210EFA59C43F1A76B4EF04B54F91413BF504AB2E1D7B95C1587AD

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 2153 453264-4532b5 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 2154 4532b7-4532be 2153->2154 2155 4532c0-4532c2 2153->2155 2154->2155 2156 4532c4 2154->2156 2157 4532c6-4532fc call 42e3a4 call 42e8d8 call 403400 2155->2157 2156->2157
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 00453284
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045328A
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 0045329E
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004532A4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                                                    • API String ID: 1646373207-2130885113
                                                                                                                    • Opcode ID: fefb573a8bf21237f087afe8746b401672172bd733c1b35172c6518a57225724
                                                                                                                    • Instruction ID: 110c83de3d6355277510abd5b52a320a2c8dd2afbae334eef16c728cb9d202ef
                                                                                                                    • Opcode Fuzzy Hash: fefb573a8bf21237f087afe8746b401672172bd733c1b35172c6518a57225724
                                                                                                                    • Instruction Fuzzy Hash: 5E01DF70644645AFD300BF769C02F2A3A58E705B9BF60447BFC00A62D3CA7C8A0CCA2D
                                                                                                                    APIs
                                                                                                                    • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 004672CB
                                                                                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004672F1
                                                                                                                      • Part of subcall function 00467168: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467200
                                                                                                                      • Part of subcall function 00467168: DestroyCursor.USER32(00000000), ref: 00467216
                                                                                                                    • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 00467348
                                                                                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 004673A9
                                                                                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 004673CF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                                                    • String ID: c:\directory$shell32.dll
                                                                                                                    • API String ID: 3376378930-1375355148
                                                                                                                    • Opcode ID: 8ba974db7d431cfc828555254f055e085d4bb255e1d8418bde2e11c534446a10
                                                                                                                    • Instruction ID: 712749594264273e91c57dfa4baa87cbb3c5fbf3a827f6648ccfc37e71b26823
                                                                                                                    • Opcode Fuzzy Hash: 8ba974db7d431cfc828555254f055e085d4bb255e1d8418bde2e11c534446a10
                                                                                                                    • Instruction Fuzzy Hash: 3B515F70604204AFDB10EF65CC89FDEB7E8AB48308F1041B7F80897351D6389E80DB59
                                                                                                                    APIs
                                                                                                                    • RegisterClipboardFormatA.USER32(commdlg_help), ref: 004309BC
                                                                                                                    • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 004309CB
                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 004309E5
                                                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00430A06
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                                                    • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                                                    • API String ID: 4130936913-2943970505
                                                                                                                    • Opcode ID: c544fb85ff372cb1e77a17e690d9a21f18419a27c2c54a515182e1a09c276035
                                                                                                                    • Instruction ID: 7bf223393b5a8c163278de6a14ca069cc176d79392cc0efa73562a49209d61c7
                                                                                                                    • Opcode Fuzzy Hash: c544fb85ff372cb1e77a17e690d9a21f18419a27c2c54a515182e1a09c276035
                                                                                                                    • Instruction Fuzzy Hash: 2FF082709583409BC300FB6598427197BE0AB58308F00567FB458A2291E77C9900CB5F
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,004552A0,004552A0,00000031,004552A0,00000000), ref: 0045522E
                                                                                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00000080,COMMAND.COM" /C ,?,004552A0,004552A0,00000031,004552A0), ref: 0045523B
                                                                                                                      • Part of subcall function 00454FF0: WaitForInputIdle.USER32(00000001,00000032), ref: 0045501C
                                                                                                                      • Part of subcall function 00454FF0: MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 0045503E
                                                                                                                      • Part of subcall function 00454FF0: GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 0045504D
                                                                                                                      • Part of subcall function 00454FF0: CloseHandle.KERNEL32(00000001,0045507A,00455073,?,00000031,00000080,00000000,?,?,004553D3,00000080,0000003C,00000000,004553E9), ref: 0045506D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                                                    • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                                                    • API String ID: 854858120-615399546
                                                                                                                    • Opcode ID: d2a51973db6fb381566d3318c8d1c64650a6deee5eec0096a1c7ebc239f8887e
                                                                                                                    • Instruction ID: fd2d6d40b6f8736679a78553b36ca572aba09dccd5489fff61a9141705bf80db
                                                                                                                    • Opcode Fuzzy Hash: d2a51973db6fb381566d3318c8d1c64650a6deee5eec0096a1c7ebc239f8887e
                                                                                                                    • Instruction Fuzzy Hash: 26516D30A0071DABDF01EF95C852BEEBBB9AF44345F50407BF804B7282D7785A098B59
                                                                                                                    APIs
                                                                                                                    • LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                                                    • OemToCharA.USER32(?,?), ref: 0042376C
                                                                                                                    • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Char$FileIconLoadLowerModuleName
                                                                                                                    • String ID: 2$MAINICON
                                                                                                                    • API String ID: 3935243913-3181700818
                                                                                                                    • Opcode ID: 94be23ded0f0311b18ce29275d80a7e53a17d1ad05c6cae946e4599a61e1d5ea
                                                                                                                    • Instruction ID: 6f4b3398584102735ad00b8493fe389bc1dbaef6f787fac7706901cc0cbf584f
                                                                                                                    • Opcode Fuzzy Hash: 94be23ded0f0311b18ce29275d80a7e53a17d1ad05c6cae946e4599a61e1d5ea
                                                                                                                    • Instruction Fuzzy Hash: 23319370A042549ADF10EF69C8C57C67BE8AF14308F4441BAE844DB393D7BED988CB69
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F4D
                                                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F6E
                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00418F89
                                                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418FAA
                                                                                                                      • Part of subcall function 004230D8: GetDC.USER32(00000000), ref: 0042312E
                                                                                                                      • Part of subcall function 004230D8: EnumFontsA.GDI32(00000000,00000000,00423078,00410470,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                                                      • Part of subcall function 004230D8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423149
                                                                                                                      • Part of subcall function 004230D8: ReleaseDC.USER32(00000000,00000000), ref: 00423154
                                                                                                                      • Part of subcall function 0042369C: LoadIconA.USER32(00400000,MAINICON), ref: 0042372C
                                                                                                                      • Part of subcall function 0042369C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 00423759
                                                                                                                      • Part of subcall function 0042369C: OemToCharA.USER32(?,?), ref: 0042376C
                                                                                                                      • Part of subcall function 0042369C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FF6,00000000,?,?,?,00000001), ref: 004237AC
                                                                                                                      • Part of subcall function 0041F128: GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                                                      • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                                                      • Part of subcall function 0041F128: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                                                      • Part of subcall function 0041F128: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                                                      • Part of subcall function 0041F128: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                                                                    • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                                                    • API String ID: 316262546-2767913252
                                                                                                                    • Opcode ID: 13d9bdced9750e67f73d93ec74d54abaa35f495c5bba4d3cc3e2f323313cf858
                                                                                                                    • Instruction ID: b4be2cf3334f9eeef2f7e30357217019d1f7f37f78cfa945b19fc5b38c57745f
                                                                                                                    • Opcode Fuzzy Hash: 13d9bdced9750e67f73d93ec74d54abaa35f495c5bba4d3cc3e2f323313cf858
                                                                                                                    • Instruction Fuzzy Hash: CE112CB06142409BC740FF66998278A7BE1AB68308F40943FF848E7291DB3DAD458B1E
                                                                                                                    APIs
                                                                                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 00413674
                                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0041367F
                                                                                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413691
                                                                                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 004136A4
                                                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136BB
                                                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136D2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: LongWindow$Prop
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3887896539-0
                                                                                                                    • Opcode ID: 34b367db4fa110d3f73a4511ae8beb0e64a5e5a51f2810bc4cb64f6c76f31942
                                                                                                                    • Instruction ID: 3f72449cbd34e5f3a25e72b7cfa2937fee5ee0203059de802df544128507dfad
                                                                                                                    • Opcode Fuzzy Hash: 34b367db4fa110d3f73a4511ae8beb0e64a5e5a51f2810bc4cb64f6c76f31942
                                                                                                                    • Instruction Fuzzy Hash: DA11CC76100244BFDF00DF99DC84E9A37E8AB19364F104266B918DB3E2D739E9909B99
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00455917,?,00000000,00455957), ref: 0045585D
                                                                                                                    Strings
                                                                                                                    • PendingFileRenameOperations, xrefs: 004557FC
                                                                                                                    • WININIT.INI, xrefs: 0045588C
                                                                                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004557E0
                                                                                                                    • PendingFileRenameOperations2, xrefs: 0045582C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                                                    • API String ID: 47109696-2199428270
                                                                                                                    • Opcode ID: d6aaa45444c4cce775ea3ed1e02519811f6359e75aa14beb5e2e26aef1c4477d
                                                                                                                    • Instruction ID: 0edf169a16dfa4fb7533b8b55fc7b889579560f25e46b257abcc71cf1b5dc2f9
                                                                                                                    • Opcode Fuzzy Hash: d6aaa45444c4cce775ea3ed1e02519811f6359e75aa14beb5e2e26aef1c4477d
                                                                                                                    • Instruction Fuzzy Hash: AB519874E00608DBDB10EF62DC51AEEB7B9EF44315F50847BEC04A7292DB7CAA45CA58
                                                                                                                    APIs
                                                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047D16E,?,?,00000000,0049C628,00000000,00000000,?,00498C11,00000000,00498DBA,?,00000000), ref: 0047D0AB
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,0047D16E,?,?,00000000,0049C628,00000000,00000000,?,00498C11,00000000,00498DBA,?,00000000), ref: 0047D0B4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                    • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                                                                    • API String ID: 1375471231-2952887711
                                                                                                                    • Opcode ID: 25c04a0431a7ee364bf77b853a87c64d84ba0ee8a91acc81a543a28b47532cb6
                                                                                                                    • Instruction ID: c65adf921b1b6e4579252068e4265065b5a45be28dde5098669b3b5892976db2
                                                                                                                    • Opcode Fuzzy Hash: 25c04a0431a7ee364bf77b853a87c64d84ba0ee8a91acc81a543a28b47532cb6
                                                                                                                    • Instruction Fuzzy Hash: F9411674E101099BDB01EF95DC82ADEB7B9EF45309F50853BE81477392DB38AE058B68
                                                                                                                    APIs
                                                                                                                    • EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                                                    • GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                                                    • SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$EnumLongWindows
                                                                                                                    • String ID: lAB
                                                                                                                    • API String ID: 4191631535-3476862382
                                                                                                                    • Opcode ID: 7dcdbb5f1d382cba8886e06331430e6d6fce3cff686b988b3074a9d4c358ab09
                                                                                                                    • Instruction ID: 1d232068e43b915345d7588b37cc7287aafbcd058231e570564fb52883b43028
                                                                                                                    • Opcode Fuzzy Hash: 7dcdbb5f1d382cba8886e06331430e6d6fce3cff686b988b3074a9d4c358ab09
                                                                                                                    • Instruction Fuzzy Hash: E3115E70704610ABDB10AF28DC85F5A77E8EB08725F50026AF9A49B2E7C378DD40CB58
                                                                                                                    APIs
                                                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE60
                                                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFFB,00000000,0042E013,?,?,?,?,00000006,?,00000000,00497F35), ref: 0042DE7B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE81
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressDeleteHandleModuleProc
                                                                                                                    • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                                                    • API String ID: 588496660-1846899949
                                                                                                                    • Opcode ID: 780e4264db312733bee64b8429de1b59d21d94b92bca9a45197840037c94c444
                                                                                                                    • Instruction ID: 9cada17f2adbafa0ebcb77ec43832f820b82eaaa71c9ca0bcc52793b6cf27115
                                                                                                                    • Opcode Fuzzy Hash: 780e4264db312733bee64b8429de1b59d21d94b92bca9a45197840037c94c444
                                                                                                                    • Instruction Fuzzy Hash: EFE065B1B40A70BAD62036657C89B972718DB79325F615537F105A91D182BC1C40CE9C
                                                                                                                    Strings
                                                                                                                    • Need to restart Windows? %s, xrefs: 0046BF95
                                                                                                                    • PrepareToInstall failed: %s, xrefs: 0046BF6E
                                                                                                                    • NextButtonClick, xrefs: 0046BD4C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                                                    • API String ID: 0-2329492092
                                                                                                                    • Opcode ID: 2482342cf09780f3cc85a79916584030efb236fd66ea0455236200f368d4c793
                                                                                                                    • Instruction ID: 9b4fd168f37c7da821868febde12ed9d5c4eb704a6c877b85ca6115e961808cc
                                                                                                                    • Opcode Fuzzy Hash: 2482342cf09780f3cc85a79916584030efb236fd66ea0455236200f368d4c793
                                                                                                                    • Instruction Fuzzy Hash: ECD12B34A00109DFCB10EFA9D585AEE77F5EF49304F6440BAE404AB352E778AE45CB5A
                                                                                                                    APIs
                                                                                                                    • SetActiveWindow.USER32(?,?,00000000,004838B9), ref: 0048368C
                                                                                                                    • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 0048372A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ActiveChangeNotifyWindow
                                                                                                                    • String ID: $Need to restart Windows? %s
                                                                                                                    • API String ID: 1160245247-4200181552
                                                                                                                    • Opcode ID: 1d42271db157847063bc1684c76a3f1b571b73f0fbe1024385b2a1440cdba256
                                                                                                                    • Instruction ID: ac7489165aebe6410750fc54bddbdfbbf0a744a872c0faa15b6e968571d36d29
                                                                                                                    • Opcode Fuzzy Hash: 1d42271db157847063bc1684c76a3f1b571b73f0fbe1024385b2a1440cdba256
                                                                                                                    • Instruction Fuzzy Hash: 2891B274A042449FCB11FF69D885B9D7BE0AF59709F0044BBE8009B362D778AE49CB5E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                                                    • GetLastError.KERNEL32(00000000,0046FED1,?,?,0049D1E0,00000000), ref: 0046FDAE
                                                                                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FE28
                                                                                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FE4D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                                                    • String ID: Creating directory: %s
                                                                                                                    • API String ID: 2451617938-483064649
                                                                                                                    • Opcode ID: 117d1655f334007bf170a7645c0ff38e0762150d831baea0a8383fbe162a65f0
                                                                                                                    • Instruction ID: bfe09206507b5b37383d903e763d781286b330fb05695de0be9d4a8a79558abe
                                                                                                                    • Opcode Fuzzy Hash: 117d1655f334007bf170a7645c0ff38e0762150d831baea0a8383fbe162a65f0
                                                                                                                    • Instruction Fuzzy Hash: 73513074E00248ABDB01DBA5D982BDEBBF5AF48304F50857AE840B7392D7795E08CB59
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454EF6
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454FBC), ref: 00454F60
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressByteCharMultiProcWide
                                                                                                                    • String ID: SfcIsFileProtected$sfc.dll
                                                                                                                    • API String ID: 2508298434-591603554
                                                                                                                    • Opcode ID: f5f955375822eed2e595ad3cd825f11fb59e8bcedfb5ba1d29721425109c3d67
                                                                                                                    • Instruction ID: fbb3ec6cd5b50b63fd35f8a1b68fa202e0926d3941eb24adcf984c27ed24a225
                                                                                                                    • Opcode Fuzzy Hash: f5f955375822eed2e595ad3cd825f11fb59e8bcedfb5ba1d29721425109c3d67
                                                                                                                    • Instruction Fuzzy Hash: E041A931A04218AFE710DB59DC85B9DB7B8AB4430DF5041BBA908A7293D7789F89CB1D
                                                                                                                    APIs
                                                                                                                    • 74D41520.VERSION(00000000,?,?,?,00497FD8), ref: 004525A4
                                                                                                                    • 74D41500.VERSION(00000000,?,00000000,?,00000000,0045261F,?,00000000,?,?,?,00497FD8), ref: 004525D1
                                                                                                                    • 74D41540.VERSION(?,00452648,?,?,00000000,?,00000000,?,00000000,0045261F,?,00000000,?,?,?,00497FD8), ref: 004525EB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: D41500D41520D41540
                                                                                                                    • String ID: Y&E
                                                                                                                    • API String ID: 2153611984-1497692694
                                                                                                                    • Opcode ID: fc37f08206c8e69686d66defdddf94d54b59a29bfc554a83f5df64d87965b3cc
                                                                                                                    • Instruction ID: fe46317749af1235fc1090c5145677311abee9a989b9ebf20271da6a38a4ce9d
                                                                                                                    • Opcode Fuzzy Hash: fc37f08206c8e69686d66defdddf94d54b59a29bfc554a83f5df64d87965b3cc
                                                                                                                    • Instruction Fuzzy Hash: 89218471A00608AFDB01DAA98D41DAFB7FCEB4A701F55407BFD00E3382D6B99E058769
                                                                                                                    APIs
                                                                                                                    • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDD5
                                                                                                                      • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                                                      • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                                                      • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDB8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                                                                                    • API String ID: 395431579-1506664499
                                                                                                                    • Opcode ID: 3de1580a20e5846b3bf850ea20a659677e30c94afd1c16767df8fe2661d1b0b7
                                                                                                                    • Instruction ID: c6c149a21ca36cce9dc82633ca781001b445ce448e924a27762e383bc0e4c558
                                                                                                                    • Opcode Fuzzy Hash: 3de1580a20e5846b3bf850ea20a659677e30c94afd1c16767df8fe2661d1b0b7
                                                                                                                    • Instruction Fuzzy Hash: 9611A331B40214BBD711EB62EC81B9E7BA8DB55704F90447BF400A6691DBB89E058A6C
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(?,00455B23,?,00000001,00000000), ref: 00455B16
                                                                                                                    Strings
                                                                                                                    • PendingFileRenameOperations2, xrefs: 00455AF7
                                                                                                                    • PendingFileRenameOperations, xrefs: 00455AE8
                                                                                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455AC4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                                                    • API String ID: 47109696-2115312317
                                                                                                                    • Opcode ID: 9594d32001f92b62c42cae89211f3ede8d7d24e47fbd6904b7643db8322ef9a1
                                                                                                                    • Instruction ID: 8ecee5c25e066e5253f0bac752b33d84760847f1c596038c9bfe8eab8c09834c
                                                                                                                    • Opcode Fuzzy Hash: 9594d32001f92b62c42cae89211f3ede8d7d24e47fbd6904b7643db8322ef9a1
                                                                                                                    • Instruction Fuzzy Hash: 62F06D71604A08ABE704D666EC2BA3F73ACD745711FA0446AF80096682EA7DBD04966C
                                                                                                                    APIs
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00472521,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD), ref: 004724FD
                                                                                                                    • FindClose.KERNEL32(000000FF,00472528,00472521,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD,?), ref: 0047251B
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00472643,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD), ref: 0047261F
                                                                                                                    • FindClose.KERNEL32(000000FF,0047264A,00472643,?,00000000,?,0049D1E0,00000000,00472711,?,00000000,?,00000000,?,004728DD,?), ref: 0047263D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$CloseFileNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2066263336-0
                                                                                                                    • Opcode ID: 2ebc6e526ef3f332d7d23b3c970b82b2693ae9964aad5ea01d0d0e8cb2a6954e
                                                                                                                    • Instruction ID: 7a1bd4c17f6bec3c86e88fdd6a66a52641a18dd0aa7136e5d167ac57a2fd4188
                                                                                                                    • Opcode Fuzzy Hash: 2ebc6e526ef3f332d7d23b3c970b82b2693ae9964aad5ea01d0d0e8cb2a6954e
                                                                                                                    • Instruction Fuzzy Hash: EFC13A7090424DAFCF11DFA5C981ADEBBB8BF48304F5085AAE848B3291D7789E46CF54
                                                                                                                    APIs
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?,?,00000000), ref: 00480222
                                                                                                                    • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?,?), ref: 0048022F
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00480348,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625), ref: 00480324
                                                                                                                    • FindClose.KERNEL32(000000FF,0048034F,00480348,?,?,?,?,00000000,00480375,?,00000000,00000000,?,?,00481625,?), ref: 00480342
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$CloseFileNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2066263336-0
                                                                                                                    • Opcode ID: c9213149dad22109f0a90e82e8ac420b2eeb9db7d2efcfc5c24199a260e086dc
                                                                                                                    • Instruction ID: 9f58e88908a8a949c71addf9751e3e387abd808faae0fc06516958b92eae9c2a
                                                                                                                    • Opcode Fuzzy Hash: c9213149dad22109f0a90e82e8ac420b2eeb9db7d2efcfc5c24199a260e086dc
                                                                                                                    • Instruction Fuzzy Hash: EF514071A00648AFCB61EFA5CC45ADEB7B8EB48315F1044AAA808E7351D6389F89CF54
                                                                                                                    APIs
                                                                                                                    • GetMenu.USER32(00000000), ref: 00421371
                                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 0042138E
                                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 004213C3
                                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 004213DF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3711407533-0
                                                                                                                    • Opcode ID: e1bfbeb149fb62e2ad3ad2db837168bd52a0f21d6f4abec7b0304e20cb9d907d
                                                                                                                    • Instruction ID: e7a4369f7fbd106bab2429e1e1dd333134a7e32046ee40fa4552f8195e128e42
                                                                                                                    • Opcode Fuzzy Hash: e1bfbeb149fb62e2ad3ad2db837168bd52a0f21d6f4abec7b0304e20cb9d907d
                                                                                                                    • Instruction Fuzzy Hash: 3F41BE3070026457EB20EA7AA88579B26965F69318F4815BFBC40DF3A3CA7DCC49839D
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(?,?,?,?), ref: 00416B94
                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00416BAE
                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00416BC8
                                                                                                                    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BF0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Color$CallMessageProcSendTextWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 601730667-0
                                                                                                                    • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                                                    • Instruction ID: 87133af12c35957a9f748eb5c35761c869d5d8ea54ed11f3f8892641f8a911b8
                                                                                                                    • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                                                    • Instruction Fuzzy Hash: A71151B5600A04AFC710EE6ECC84E8773ECDF48314715843EB59ADB612D63CF8418B69
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 0042312E
                                                                                                                    • EnumFontsA.GDI32(00000000,00000000,00423078,00410470,00000000,?,?,00000000,?,00418FE3,00000000,?,?,?,00000001), ref: 00423141
                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423149
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00423154
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CapsDeviceEnumFontsRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2698912916-0
                                                                                                                    • Opcode ID: 94eb306c5e826a01f1e4729cfd5040e8a639f913efc3b2db58b8d9c882bc8d8f
                                                                                                                    • Instruction ID: 95c686a17d04cc75fabac772af01a2849e5ccccd572a20f260adec4fb0f0daed
                                                                                                                    • Opcode Fuzzy Hash: 94eb306c5e826a01f1e4729cfd5040e8a639f913efc3b2db58b8d9c882bc8d8f
                                                                                                                    • Instruction Fuzzy Hash: 7D01DE617043002AE310BF7A5C82BAB3BA49F05319F40027FF908AA3C2D67E9C0447AE
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004509A0: SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                                                                    • FlushFileBuffers.KERNEL32(?), ref: 0045C541
                                                                                                                    Strings
                                                                                                                    • NumRecs range exceeded, xrefs: 0045C43E
                                                                                                                    • EndOffset range exceeded, xrefs: 0045C475
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$BuffersFlush
                                                                                                                    • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                                                    • API String ID: 3593489403-659731555
                                                                                                                    • Opcode ID: aa52e399180f0699983c3f92ff45f69b6c274b580d00465cafb9d74568cd5a77
                                                                                                                    • Instruction ID: 57127da9839884e48f93c65e4688b7b5a24f3d4ce709f11da5987aa0442ebed2
                                                                                                                    • Opcode Fuzzy Hash: aa52e399180f0699983c3f92ff45f69b6c274b580d00465cafb9d74568cd5a77
                                                                                                                    • Instruction Fuzzy Hash: E461A234A003588FDB25DF25C891AD9B7B5EF49305F0084DAED89AB352DA74AEC8CF54
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,0049928E), ref: 0040334B
                                                                                                                      • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,0049928E), ref: 00403356
                                                                                                                      • Part of subcall function 0040632C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00499298), ref: 00406332
                                                                                                                      • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040633F
                                                                                                                      • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406355
                                                                                                                      • Part of subcall function 0040632C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040636B
                                                                                                                      • Part of subcall function 0040632C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00499298), ref: 00406376
                                                                                                                      • Part of subcall function 004063D4: 6F551CD0.COMCTL32(0049929D), ref: 004063D4
                                                                                                                      • Part of subcall function 00410774: GetCurrentThreadId.KERNEL32 ref: 004107C2
                                                                                                                      • Part of subcall function 00419050: GetVersion.KERNEL32(004992B6), ref: 00419050
                                                                                                                      • Part of subcall function 0044F7B8: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004992CA), ref: 0044F7F3
                                                                                                                      • Part of subcall function 0044F7B8: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F7F9
                                                                                                                      • Part of subcall function 0044FC84: GetVersionExA.KERNEL32(0049C790,004992CF), ref: 0044FC93
                                                                                                                      • Part of subcall function 00453264: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 00453284
                                                                                                                      • Part of subcall function 00453264: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0045328A
                                                                                                                      • Part of subcall function 00453264: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,004532FD,?,?,?,?,00000000,?,004992DE), ref: 0045329E
                                                                                                                      • Part of subcall function 00453264: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004532A4
                                                                                                                      • Part of subcall function 0045715C: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00457180
                                                                                                                      • Part of subcall function 0046469C: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004992F2), ref: 004646AB
                                                                                                                      • Part of subcall function 0046469C: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 004646B1
                                                                                                                      • Part of subcall function 0046CEF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CF05
                                                                                                                      • Part of subcall function 0047905C: GetModuleHandleA.KERNEL32(kernel32.dll,?,004992FC), ref: 00479062
                                                                                                                      • Part of subcall function 0047905C: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047906F
                                                                                                                      • Part of subcall function 0047905C: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047907F
                                                                                                                      • Part of subcall function 0048446C: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0048455B
                                                                                                                      • Part of subcall function 0049628C: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 004962A5
                                                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,00499344), ref: 00499316
                                                                                                                      • Part of subcall function 00499040: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00499320,00000001,00000000,00499344), ref: 0049904A
                                                                                                                      • Part of subcall function 00499040: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00499050
                                                                                                                      • Part of subcall function 004244E4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424503
                                                                                                                      • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                                    • ShowWindow.USER32(?,00000005,00000000,00499344), ref: 00499377
                                                                                                                      • Part of subcall function 00482AAC: SetActiveWindow.USER32(?), ref: 00482B5A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF551FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                                                    • String ID: Setup
                                                                                                                    • API String ID: 3870281231-3839654196
                                                                                                                    • Opcode ID: 15cfdf88744bc512192f40e420d66a265f79e019c942488644b8f35a08c257c3
                                                                                                                    • Instruction ID: 0ced0f24ac175d21b3299cf0cac8cd2bc44ae01cd64648103e70fccb26a7f3a2
                                                                                                                    • Opcode Fuzzy Hash: 15cfdf88744bc512192f40e420d66a265f79e019c942488644b8f35a08c257c3
                                                                                                                    • Instruction Fuzzy Hash: A231C6312086408FD6117BBBEC5365D3BA8EB8D718BA2447FF80496693DE3D5C118A7E
                                                                                                                    APIs
                                                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B87,?,?,00000000,0049C628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453ADE
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B87,?,?,00000000,0049C628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453AE7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                    • String ID: .tmp
                                                                                                                    • API String ID: 1375471231-2986845003
                                                                                                                    • Opcode ID: 2ed80e6416608dc6150e1b9fc551355d0b346647940dac95e05b365424d6ca6b
                                                                                                                    • Instruction ID: ff9a18ef253650dbf03605879231b3438c9749bdb0146341c5730265e1144e14
                                                                                                                    • Opcode Fuzzy Hash: 2ed80e6416608dc6150e1b9fc551355d0b346647940dac95e05b365424d6ca6b
                                                                                                                    • Instruction Fuzzy Hash: A4213674A00208ABDB01EFA5C8529EEB7B8EB44315F50457BF801B7342DA389F058B69
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00483F60: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483F71
                                                                                                                      • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483F7E
                                                                                                                      • Part of subcall function 00483F60: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483F8C
                                                                                                                      • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483F94
                                                                                                                      • Part of subcall function 00483F60: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483FA0
                                                                                                                      • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483FC1
                                                                                                                      • Part of subcall function 00483F60: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483FD4
                                                                                                                      • Part of subcall function 00483F60: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483FDA
                                                                                                                      • Part of subcall function 0048428C: GetVersionExA.KERNEL32(?,0048449E,00000000,00484573,?,?,?,?,?,00499301), ref: 0048429A
                                                                                                                      • Part of subcall function 0048428C: GetVersionExA.KERNEL32(0000009C,?,0048449E,00000000,00484573,?,?,?,?,?,00499301), ref: 004842EC
                                                                                                                      • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                                                      • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0048455B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                                                                    • String ID: SHGetKnownFolderPath$shell32.dll
                                                                                                                    • API String ID: 3869789854-2936008475
                                                                                                                    • Opcode ID: 177ecd477187cf0aa2f8efa4f2166874e312c59e244f709b907e4e614229d51f
                                                                                                                    • Instruction ID: 72a1cd0c007ae7d2331b3d049f57d6a032e0567b1decddf8ad8e9e8191a8a5bf
                                                                                                                    • Opcode Fuzzy Hash: 177ecd477187cf0aa2f8efa4f2166874e312c59e244f709b907e4e614229d51f
                                                                                                                    • Instruction Fuzzy Hash: D821EFB0A243416AC700BFBE596614A3BA5EB9471C390493BF800EB3D1D67E6414AB6E
                                                                                                                    APIs
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047CDB0,00000000,0047CDC6), ref: 0047CABE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Close
                                                                                                                    • String ID: RegisteredOrganization$RegisteredOwner
                                                                                                                    • API String ID: 3535843008-1113070880
                                                                                                                    • Opcode ID: 6f9c09efad981c5bd73ac330414f3a1e85251ce5b1d1905e82279f7a283c4c8b
                                                                                                                    • Instruction ID: 80e31e652a078fa29572911d568a821ff54af8e3d41ae7cfbc3eead46bc77173
                                                                                                                    • Opcode Fuzzy Hash: 6f9c09efad981c5bd73ac330414f3a1e85251ce5b1d1905e82279f7a283c4c8b
                                                                                                                    • Instruction Fuzzy Hash: 99F09021B04108ABD710D664EC82B9B33A9D741308F24847FA1049B351D679AE00975C
                                                                                                                    APIs
                                                                                                                    • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,JfG,?,0049D1E0,?,0046F353,?,00000000,0046F8EE,?,_is1), ref: 0046F05F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Value
                                                                                                                    • String ID: Inno Setup: Setup Version$JfG
                                                                                                                    • API String ID: 3702945584-2837433363
                                                                                                                    • Opcode ID: ba37289afc6bf64f1b4e35152e82186c6909c63cd97613f7ebaef7afec976743
                                                                                                                    • Instruction ID: 9307b71ef0b0d9a21e7f4f46c2dc1735a92df317579ad27da25cacea1a1ff421
                                                                                                                    • Opcode Fuzzy Hash: ba37289afc6bf64f1b4e35152e82186c6909c63cd97613f7ebaef7afec976743
                                                                                                                    • Instruction Fuzzy Hash: 0AE06D713016047FD710AA6B9C85F5BABDCDF88365F00403AB908DB392D578DD0042A8
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004758BF), ref: 004756AD
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,004758BF), ref: 004756C4
                                                                                                                      • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateErrorFileHandleLast
                                                                                                                    • String ID: CreateFile
                                                                                                                    • API String ID: 2528220319-823142352
                                                                                                                    • Opcode ID: 987bab987f918cbbcd4a0fbcaaf07fd7f86d6a420f73eccc9c31e808c1deb67f
                                                                                                                    • Instruction ID: 806dc226f5a2fe5ebbb1f055bcab6d135f745baec99644e0dc49489f7e0d9994
                                                                                                                    • Opcode Fuzzy Hash: 987bab987f918cbbcd4a0fbcaaf07fd7f86d6a420f73eccc9c31e808c1deb67f
                                                                                                                    • Instruction Fuzzy Hash: E4E06D303403447BEA10EA79DCC6F4A77989B04778F108151FA48AF3E2C5B9FC408A58
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004570EC: CoInitialize.OLE32(00000000), ref: 004570F2
                                                                                                                      • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                                                      • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 00457180
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                                                    • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                                                    • API String ID: 2906209438-2320870614
                                                                                                                    • Opcode ID: cc1147c2e1d815ada544a8deacfd39f8fc5ac30e44f7f731c453ecb89e44e363
                                                                                                                    • Instruction ID: 9c527047bf7e84dae422e031a0d6d6e9bbae4a3d03e504f065b317ec79f67602
                                                                                                                    • Opcode Fuzzy Hash: cc1147c2e1d815ada544a8deacfd39f8fc5ac30e44f7f731c453ecb89e44e363
                                                                                                                    • Instruction Fuzzy Hash: 6AC04CA0B4591066C70077B6AC0361F24459B4072FB14C07BBD44A7787CE3D884D6A6E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042E3A4: SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                                                      • Part of subcall function 0042E3A4: LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CF05
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressErrorLibraryLoadModeProc
                                                                                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                                                    • API String ID: 2492108670-2683653824
                                                                                                                    • Opcode ID: b39adebe5b5dd13606c39516680d492bcb389ea4347c3d86a6e1c09172fda979
                                                                                                                    • Instruction ID: 33f7e53ae4e5ba8297804bd6606edee94f75655c5a8d17986cd3cb8a189a0b51
                                                                                                                    • Opcode Fuzzy Hash: b39adebe5b5dd13606c39516680d492bcb389ea4347c3d86a6e1c09172fda979
                                                                                                                    • Instruction Fuzzy Hash: CDB092B0A146405ACB446772988262B20069B4071DF60843BB4C4AB6D9EABC88492B9F
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,0044877D), ref: 004486C0
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00448741
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2574300362-0
                                                                                                                    • Opcode ID: 9192854c716958fcf12a54fd54f15ae173329ead0ce31acd6b56a672af8f6247
                                                                                                                    • Instruction ID: 67510ac2dd358758032eb9bd0b15bc7699fd1d5ac1297ef1938a655c08aa7b0d
                                                                                                                    • Opcode Fuzzy Hash: 9192854c716958fcf12a54fd54f15ae173329ead0ce31acd6b56a672af8f6247
                                                                                                                    • Instruction Fuzzy Hash: 89515574E00109AFDB10EF95C891A9EB7F9EB44315F20817FE814BB391CA789E05CB99
                                                                                                                    APIs
                                                                                                                    • GetSystemMenu.USER32(00000000,00000000,00000000,00482298), ref: 00482230
                                                                                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00482241
                                                                                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00482259
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$Append$System
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1489644407-0
                                                                                                                    • Opcode ID: b0f6966b6a184f1facb0a871f26b18c64fa7cdea68dfa8979e13f5b501864372
                                                                                                                    • Instruction ID: a26f55f7f9cdec50315d50fbbd1418f41be5c601f9b239732c1f252fb764c371
                                                                                                                    • Opcode Fuzzy Hash: b0f6966b6a184f1facb0a871f26b18c64fa7cdea68dfa8979e13f5b501864372
                                                                                                                    • Instruction Fuzzy Hash: FE31CD707043451BD721BB368D86B9E3B949B5A318F50197FF900AA3E3CABC9D09839D
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 0044B475
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0044B498
                                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0044B4CB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ObjectReleaseSelect
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1831053106-0
                                                                                                                    • Opcode ID: a18c564e5665bffaeec971d30f69da7c159b46b6830c6159626304e36c153c38
                                                                                                                    • Instruction ID: 7b4e641b5f80a70363e1f29cb6207b12473e64a09d761e596b30cfa5093ee172
                                                                                                                    • Opcode Fuzzy Hash: a18c564e5665bffaeec971d30f69da7c159b46b6830c6159626304e36c153c38
                                                                                                                    • Instruction Fuzzy Hash: FE217970E04344BFEB11DFA5C841B9EBBB8DB49304F51807AF900A6292D77CD940CB59
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B1C0,?,00482AC7,?,?), ref: 0044B192
                                                                                                                    • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B1A5
                                                                                                                    • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B1D9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DrawText$ByteCharMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 65125430-0
                                                                                                                    • Opcode ID: 9eed18fe0356815f810c820b6721896f6c4265f9db16303b213c34b2c03d3f04
                                                                                                                    • Instruction ID: 63060d4c4a21d3a06b37f0b793f587d40fe85ad593019d515c43c5dd919fcfdf
                                                                                                                    • Opcode Fuzzy Hash: 9eed18fe0356815f810c820b6721896f6c4265f9db16303b213c34b2c03d3f04
                                                                                                                    • Instruction Fuzzy Hash: 3111CBB27046047FEB11DB6A9C82D6F77ECDB49750F10417BF504D72D0D6389E018669
                                                                                                                    APIs
                                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424422
                                                                                                                    • TranslateMessage.USER32(?), ref: 0042449F
                                                                                                                    • DispatchMessageA.USER32(?), ref: 004244A9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$DispatchPeekTranslate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4217535847-0
                                                                                                                    • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                                                    • Instruction ID: 24a07c1e81c585bad35552c3917a3e7b04f02dd2aaee7f9545dc892aa94dfb52
                                                                                                                    • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                                                    • Instruction Fuzzy Hash: AE119E307043205AEE20FA64AD41B9B73D4DFE1708F80881EF8D997382D77D9E49879A
                                                                                                                    APIs
                                                                                                                    • SetPropA.USER32(00000000,00000000), ref: 0041667A
                                                                                                                    • SetPropA.USER32(00000000,00000000), ref: 0041668F
                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166B6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Prop$Window
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3363284559-0
                                                                                                                    • Opcode ID: 9ba9d7b7418b74f48756624976096bebc6fb66c7a646a8b19f5d3d1e069ceb03
                                                                                                                    • Instruction ID: 86f537f0b59e140ef7690159b30d1f2105a0adb91ae91f828a802e84d443a7b9
                                                                                                                    • Opcode Fuzzy Hash: 9ba9d7b7418b74f48756624976096bebc6fb66c7a646a8b19f5d3d1e069ceb03
                                                                                                                    • Instruction Fuzzy Hash: 4AF0BD72741220ABE710AB598C85FA632ECAB0D715F16017ABA05EF286C679DC4087A8
                                                                                                                    APIs
                                                                                                                    • IsWindowVisible.USER32(?), ref: 0041EE74
                                                                                                                    • IsWindowEnabled.USER32(?), ref: 0041EE7E
                                                                                                                    • EnableWindow.USER32(?,00000000), ref: 0041EEA4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$EnableEnabledVisible
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3234591441-0
                                                                                                                    • Opcode ID: 908e1640c45beef437f125b63470cd7f97cb81b788dbbb5d15c196427eefded0
                                                                                                                    • Instruction ID: 2c5c4f0331a1d41ebe9848165d0c8b98450d8d3461f9c723900bbadb0b89b381
                                                                                                                    • Opcode Fuzzy Hash: 908e1640c45beef437f125b63470cd7f97cb81b788dbbb5d15c196427eefded0
                                                                                                                    • Instruction Fuzzy Hash: 2DE0E5B81003006EE310AB2BEC81A57779CAB55354F55843BAC0997292D63ED8509ABD
                                                                                                                    APIs
                                                                                                                    • SetActiveWindow.USER32(?), ref: 0046A0F1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ActiveWindow
                                                                                                                    • String ID: PrepareToInstall
                                                                                                                    • API String ID: 2558294473-1101760603
                                                                                                                    • Opcode ID: b7687f3bb43c73226d704110cc29f9815bff5a15c1e12b08bb6fc701f5c431d6
                                                                                                                    • Instruction ID: 8b7f344ad1fa3e917ae8cfb2dbd3f87d9064e965c7569195748e39604a53e5b8
                                                                                                                    • Opcode Fuzzy Hash: b7687f3bb43c73226d704110cc29f9815bff5a15c1e12b08bb6fc701f5c431d6
                                                                                                                    • Instruction Fuzzy Hash: D2A11934A00109DFCB00EF99D986EDEB7F5AF49304F5540B6E804AB366D738AE45CB5A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: /:*?"<>|
                                                                                                                    • API String ID: 0-4078764451
                                                                                                                    • Opcode ID: 06161939b9b6972920a3f4778fa34d5926bec049205355badb073ad507413406
                                                                                                                    • Instruction ID: 6f1ddb1d4c6bf41fe4e6ef022f3ca721468d6fb529cb74a3921b09cafe59df1d
                                                                                                                    • Opcode Fuzzy Hash: 06161939b9b6972920a3f4778fa34d5926bec049205355badb073ad507413406
                                                                                                                    • Instruction Fuzzy Hash: BB719270A44205ABEB20F765DCC2BEE77A19B41348F10C077F580BB292E779AD49875E
                                                                                                                    APIs
                                                                                                                    • SetActiveWindow.USER32(?), ref: 00482B5A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ActiveWindow
                                                                                                                    • String ID: InitializeWizard
                                                                                                                    • API String ID: 2558294473-2356795471
                                                                                                                    • Opcode ID: 9aeb3d77867af7e6d972f6b1feb637164b3d788d95ca79b69b372c6f9b450635
                                                                                                                    • Instruction ID: db7d1b329271c039a587c966101a95f378ab38c3ed45019f3272f41b6ba32bbe
                                                                                                                    • Opcode Fuzzy Hash: 9aeb3d77867af7e6d972f6b1feb637164b3d788d95ca79b69b372c6f9b450635
                                                                                                                    • Instruction Fuzzy Hash: 6D115E31A09200AFD715FF29ED86B1A7BE4E759328F60443BE404872A1DA79AC46DB1D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047CBC4,00000000,0047CDC6), ref: 0047C9BD
                                                                                                                    Strings
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C98D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                                                    • API String ID: 47109696-1019749484
                                                                                                                    • Opcode ID: bb5ba15996815916538d46b22a9810ae59d53e0406c30950a209d20cc8f6864c
                                                                                                                    • Instruction ID: f187297608c4c2e120c43e334d4fef3d14aa164232434ebce48173692ca83dca
                                                                                                                    • Opcode Fuzzy Hash: bb5ba15996815916538d46b22a9810ae59d53e0406c30950a209d20cc8f6864c
                                                                                                                    • Instruction Fuzzy Hash: BAF089E170451467DA10A56A5C82BAE679D8B44758F20407FF608DB342D9B99D02435C
                                                                                                                    APIs
                                                                                                                    • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F72A,?,?,00000000,0046F8EE,?,_is1,?), ref: 0046F0BF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Value
                                                                                                                    • String ID: NoModify
                                                                                                                    • API String ID: 3702945584-1699962838
                                                                                                                    • Opcode ID: f62fff895c5cb5fcee211893b33144f563fc8351df9822a4020ec110b25f01ba
                                                                                                                    • Instruction ID: ad59d6647e2c6f1a966119a9b7040c47703766c51ad9b847bf72baa1670be9f7
                                                                                                                    • Opcode Fuzzy Hash: f62fff895c5cb5fcee211893b33144f563fc8351df9822a4020ec110b25f01ba
                                                                                                                    • Instruction Fuzzy Hash: 48E04FB4644304BFEB04DB95DD4AF6BB7ECDB48710F10405ABA04DB381E674FE008658
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    Strings
                                                                                                                    • System\CurrentControlSet\Control\Windows, xrefs: 0042DE46
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Open
                                                                                                                    • String ID: System\CurrentControlSet\Control\Windows
                                                                                                                    • API String ID: 71445658-1109719901
                                                                                                                    • Opcode ID: 0f77c8ce853619a5698b89c9811bea03ab3af1fee96e2778c5ec7c5c80741e7e
                                                                                                                    • Instruction ID: abe9ee1dba80eab6c976627f4fe301d03bda2a195c3818943ffea28d54d696bb
                                                                                                                    • Opcode Fuzzy Hash: 0f77c8ce853619a5698b89c9811bea03ab3af1fee96e2778c5ec7c5c80741e7e
                                                                                                                    • Instruction Fuzzy Hash: E7D0C7729501287BD7009A89DC41DFB775DDB15760F41441BFD1897101C1B4EC5197F8
                                                                                                                    APIs
                                                                                                                    • GetACP.KERNEL32(?,?,00000001,00000000,0047EBD7,?,-0000001A,00480A90,-00000010,?,00000004,0000001C,00000000,00480DDD,?,0045DC10), ref: 0047E96E
                                                                                                                      • Part of subcall function 0042E32C: GetDC.USER32(00000000), ref: 0042E33B
                                                                                                                      • Part of subcall function 0042E32C: EnumFontsA.GDI32(?,00000000,0042E318,00000000,00000000,0042E384,?,00000000,00000000,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 0042E366
                                                                                                                      • Part of subcall function 0042E32C: ReleaseDC.USER32(00000000,?), ref: 0042E37E
                                                                                                                    • SendNotifyMessageA.USER32(0002046A,00000496,00002711,-00000001), ref: 0047EB3E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: EnumFontsMessageNotifyReleaseSend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2649214853-0
                                                                                                                    • Opcode ID: 11d352caf6cf76a194d8beb9d25bd90a8a3644bbb7cae3402d6ea1b77134e9b7
                                                                                                                    • Instruction ID: ea9abfd011146b73e97573b99a0886535bf82ee2c4f6ab80840a8034e1b56658
                                                                                                                    • Opcode Fuzzy Hash: 11d352caf6cf76a194d8beb9d25bd90a8a3644bbb7cae3402d6ea1b77134e9b7
                                                                                                                    • Instruction Fuzzy Hash: 5D51BA746001008BCB10FF26D98169B7BA9EB99309B90C67BA4099F367D73CED46C79D
                                                                                                                    APIs
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DC4C
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD48), ref: 0042DCBC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: QueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3660427363-0
                                                                                                                    • Opcode ID: 80665b2cde9ee57e522dd8711412eaf931e33ec8b5fc09fadae09ede8aa250e9
                                                                                                                    • Instruction ID: 688ca5bec861f28c2d3c56c4d9756a3eee1da68b680b0c58c854c6ce0276e007
                                                                                                                    • Opcode Fuzzy Hash: 80665b2cde9ee57e522dd8711412eaf931e33ec8b5fc09fadae09ede8aa250e9
                                                                                                                    • Instruction Fuzzy Hash: BA414171E00529AFDB11DF95D881BAFB7B8BF40714F90846AE800F7241D778AE40CBA9
                                                                                                                    APIs
                                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DF7C
                                                                                                                    • RegCloseKey.ADVAPI32(?,0042DFED,?,00000000,00000000,00000000,00000000,00000000,0042DFE6,?,?,00000008,00000000,00000000,0042E013), ref: 0042DFE0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEnum
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2818636725-0
                                                                                                                    • Opcode ID: 1357df86ae473437fca1d40da49537d8538b09428ef48e508d84db5eaea4a0ad
                                                                                                                    • Instruction ID: 7da1df7d23dc80ab26fde5356f239728af9ce1fcf96cfee1e9d17441f3ac576c
                                                                                                                    • Opcode Fuzzy Hash: 1357df86ae473437fca1d40da49537d8538b09428ef48e508d84db5eaea4a0ad
                                                                                                                    • Instruction Fuzzy Hash: E0317170F04258AEDB11DFA2DD82BAEB7B9EB44304F91447BE501E7291D6785E01CA2D
                                                                                                                    APIs
                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458320,00000000,00458308,?,?,?,00000000,004528D6,?,?,?,00000001), ref: 004528B0
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,?,?,00458320,00000000,00458308,?,?,?,00000000,004528D6,?,?,?,00000001), ref: 004528B8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateErrorLastProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2919029540-0
                                                                                                                    • Opcode ID: a1edda8d9d43bdf6393d164a5935c6c7d72f205fa9b275187b219f24b5744e4f
                                                                                                                    • Instruction ID: f1ff12a52b9ae97e51c0fc8bedc9ee5f8128ff8695a74900dad41ba9f3169ab0
                                                                                                                    • Opcode Fuzzy Hash: a1edda8d9d43bdf6393d164a5935c6c7d72f205fa9b275187b219f24b5744e4f
                                                                                                                    • Instruction Fuzzy Hash: D1113C72604208BF8B40DEA9DD41D9F77ECEB4D310B114567FD08D3241D674AD148B68
                                                                                                                    APIs
                                                                                                                    • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040AE02
                                                                                                                    • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF5F,00000000,0040AF77,?,?,?,00000000), ref: 0040AE13
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$FindFree
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4097029671-0
                                                                                                                    • Opcode ID: c2324eb5359665644a5176f1cf96553f9563edd3f7959fa6b260dc2c350a5fba
                                                                                                                    • Instruction ID: 0dcf9cb85912d996b0f29ff8386446a7da443b122bfb24013de7d2ae06ed8127
                                                                                                                    • Opcode Fuzzy Hash: c2324eb5359665644a5176f1cf96553f9563edd3f7959fa6b260dc2c350a5fba
                                                                                                                    • Instruction Fuzzy Hash: FB01F271300300AFDB00EFA9DC92E1A77EDEB49758B108077F500AB3D1DA39AC1096AA
                                                                                                                    APIs
                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                                                    • EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Thread$CurrentEnumWindows
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2396873506-0
                                                                                                                    • Opcode ID: 4f64f9abf12c4e0f4ed6bfdbad4522da757f8f173b64a0d5440e5a48dfcb49d5
                                                                                                                    • Instruction ID: 5ea5535e16dbd3a66c9b103d663da150a627407ba9bd10677b5e32ddf65fd45d
                                                                                                                    • Opcode Fuzzy Hash: 4f64f9abf12c4e0f4ed6bfdbad4522da757f8f173b64a0d5440e5a48dfcb49d5
                                                                                                                    • Instruction Fuzzy Hash: E9016D75A04704BFD305CF6AEC1195ABBF9E749720B22C877EC04D3690E7385820DE9A
                                                                                                                    APIs
                                                                                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00452D36
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00452D5C), ref: 00452D3E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLastMove
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 55378915-0
                                                                                                                    • Opcode ID: c4b48003847f0ed345a39601a16e4078adce9229b20c3b289e599ac23a84d65a
                                                                                                                    • Instruction ID: 4fca69a62489ebc4a01fefb46b4f56da8e9c918d1d9d85a0206be36eb6df5136
                                                                                                                    • Opcode Fuzzy Hash: c4b48003847f0ed345a39601a16e4078adce9229b20c3b289e599ac23a84d65a
                                                                                                                    • Instruction Fuzzy Hash: 8501D671B04208BB8710EB7A9D4149EB7FCDB8A725760457BFC04E3642EAB85E088558
                                                                                                                    APIs
                                                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00452843), ref: 0045281D
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00452843), ref: 00452825
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1375471231-0
                                                                                                                    • Opcode ID: d7a4f75d95bed79c8c233f4972916068b26d19fe5efc33dcaccf69018b52dd06
                                                                                                                    • Instruction ID: 740ef451bc259a1e9a82c9a6d4ec6f858251f5182fd79d8d66273d0612a28aea
                                                                                                                    • Opcode Fuzzy Hash: d7a4f75d95bed79c8c233f4972916068b26d19fe5efc33dcaccf69018b52dd06
                                                                                                                    • Instruction Fuzzy Hash: E2F02871A04704BBCB00EFF5AD0159EB3E8DB4A315B1046BBFC04E3242E6B94E048698
                                                                                                                    APIs
                                                                                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 00423259
                                                                                                                    • LoadCursorA.USER32(00000000,00000000), ref: 00423283
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CursorLoad
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3238433803-0
                                                                                                                    • Opcode ID: f50906273b4dd4b76e2408c8e955edc8cf5c14898db3d3c1ed1d0f377b452c19
                                                                                                                    • Instruction ID: 8f8c17a0fbd4bdfe9a7359f041206873b2ad7c2d9544917d76f3b93295b1a640
                                                                                                                    • Opcode Fuzzy Hash: f50906273b4dd4b76e2408c8e955edc8cf5c14898db3d3c1ed1d0f377b452c19
                                                                                                                    • Instruction Fuzzy Hash: ABF0EC11704214EBDA109E7E6CC0E2A72A8DB91B36B7103BBFE3AD72D1C62E1D41427D
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(00008000), ref: 0042E3AE
                                                                                                                    • LoadLibraryA.KERNEL32(00000000,00000000,0042E3F8,?,00000000,0042E416,?,00008000), ref: 0042E3DD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLibraryLoadMode
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2987862817-0
                                                                                                                    • Opcode ID: 137f501cafdb1006b6659fce1cce54e2e1c6912f987e7b2d870eccffde90aca3
                                                                                                                    • Instruction ID: a9e68ab2b12e17ae16f3f6d0a0ea7eea8a26f05c835edb8546f20125b23269b3
                                                                                                                    • Opcode Fuzzy Hash: 137f501cafdb1006b6659fce1cce54e2e1c6912f987e7b2d870eccffde90aca3
                                                                                                                    • Instruction Fuzzy Hash: 47F08270B14744BFDB119F779C6282BBBECE749B1179248B6F810E3691E67D48108928
                                                                                                                    APIs
                                                                                                                    • SHGetKnownFolderPath.SHELL32(0049AD40,00008000,00000000,?), ref: 0047CD1F
                                                                                                                    • CoTaskMemFree.OLE32(?,0047CD62), ref: 0047CD55
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FolderFreeKnownPathTask
                                                                                                                    • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                                                    • API String ID: 969438705-544719455
                                                                                                                    • Opcode ID: 9e7160287d512f4d5a0f43fb802c4f91855d32992ec2e49df479a39f9ab0f4c4
                                                                                                                    • Instruction ID: 7f5f99bd267ec43f1d9e9eb65a142f78238518b51070f33a36bda7c886c43a5d
                                                                                                                    • Opcode Fuzzy Hash: 9e7160287d512f4d5a0f43fb802c4f91855d32992ec2e49df479a39f9ab0f4c4
                                                                                                                    • Instruction Fuzzy Hash: A8E06D31700600BEEB21DA619D92F697BA8EB48F04B61847AF504A2680D67CA900D61C
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470341,?,00000000), ref: 00450982
                                                                                                                    • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470341,?,00000000), ref: 0045098A
                                                                                                                      • Part of subcall function 00450728: GetLastError.KERNEL32(00450544,004507EA,?,00000000,?,00498504,00000001,00000000,00000002,00000000,00498665,?,?,00000005,00000000,00498699), ref: 0045072B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1156039329-0
                                                                                                                    • Opcode ID: 100ca62c34f2286d257a35485dd07fe068b79b72f0d05f198151f02be955c629
                                                                                                                    • Instruction ID: 93da46c6f1b31e6960e6eabd2e871c03f6a9f1a2e882d04747869ab33c8136e3
                                                                                                                    • Opcode Fuzzy Hash: 100ca62c34f2286d257a35485dd07fe068b79b72f0d05f198151f02be955c629
                                                                                                                    • Instruction Fuzzy Hash: 22E012B9305201ABF740EA7599C1F2F23DCDB48355F00986AB944CA18BD674DC054B66
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Global$AllocLock
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 15508794-0
                                                                                                                    • Opcode ID: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                                                                                                    • Instruction ID: 56019af84ea84d57b40f02c4528a45173e4f1cdf38a2be340d0d32551c2e1a06
                                                                                                                    • Opcode Fuzzy Hash: 38fdb687bb69d238822be17628ba02d3430ff360103c12c92fad93c094244837
                                                                                                                    • Instruction Fuzzy Hash: 699002C4C01A00A4DC0072B20C0BD3F101CD8C072C3D1486F7044B6483887C88000979
                                                                                                                    APIs
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Virtual$AllocFree
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2087232378-0
                                                                                                                    • Opcode ID: 7d9236a51a6e62d759a8b4f250f4c89c76a4556442c2f53cae6702f33709ebd9
                                                                                                                    • Instruction ID: 72296c24d993e0564b30de85c6f195fe79285825457dd4606d191d555c4bfbf2
                                                                                                                    • Opcode Fuzzy Hash: 7d9236a51a6e62d759a8b4f250f4c89c76a4556442c2f53cae6702f33709ebd9
                                                                                                                    • Instruction Fuzzy Hash: D1F08272B0063067EB605A6A4C81B6359849BC5794F254076FD09FF3E9D6B58C0142A9
                                                                                                                    APIs
                                                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408722), ref: 0040860B
                                                                                                                      • Part of subcall function 00406DFC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E19
                                                                                                                      • Part of subcall function 00408578: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1658689577-0
                                                                                                                    • Opcode ID: 5823267eaa6e0e7ee692efbee1c67039304ac956db3a02cff78b9572607a147c
                                                                                                                    • Instruction ID: 87d691d9fb5281b9ea88bf14f35752b700db14023ee960ec0a49684e6ef053d8
                                                                                                                    • Opcode Fuzzy Hash: 5823267eaa6e0e7ee692efbee1c67039304ac956db3a02cff78b9572607a147c
                                                                                                                    • Instruction Fuzzy Hash: AF316135E00109ABCB00DF55C8C19EEB779FF84314F51857BE815BB296EB38AE018B98
                                                                                                                    APIs
                                                                                                                    • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC49
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoScroll
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 629608716-0
                                                                                                                    • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                                                    • Instruction ID: de9d69d4b93587d9dbc4e1ffcd6d3196287cd482c57983938f35f532835c4bfd
                                                                                                                    • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                                                    • Instruction Fuzzy Hash: 59213EB1608745AFD350DF39D4407AABBE4BB48314F04893EA498C3741E778E99ACBD6
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                                                      • Part of subcall function 0041EEB4: EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                                                                    • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C5AE,?,00000000,?,?,0046C7C0,?,00000000,0046C834), ref: 0046C592
                                                                                                                      • Part of subcall function 0041EF68: IsWindow.USER32(?), ref: 0041EF76
                                                                                                                      • Part of subcall function 0041EF68: EnableWindow.USER32(?,00000001), ref: 0041EF85
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3319771486-0
                                                                                                                    • Opcode ID: cb068eb5dc710ff6006224cfa849e4d5ce5cc64b4f431f923f3b0af9e5388d0c
                                                                                                                    • Instruction ID: d90c9d50ec1a4df7de9101e34a36142223e0e09c2726da2ffd76a0a6e3d4faee
                                                                                                                    • Opcode Fuzzy Hash: cb068eb5dc710ff6006224cfa849e4d5ce5cc64b4f431f923f3b0af9e5388d0c
                                                                                                                    • Instruction Fuzzy Hash: 3CF0B471608300BFE7059B62EC56B257BA8D708714F91047BF40586290E5BD6844C55E
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3934441357-0
                                                                                                                    • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                                                    • Instruction ID: 093968fef036cde5cefa550fbb81a5587008482849b5a1bc4febea26ac521eef
                                                                                                                    • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                                                    • Instruction Fuzzy Hash: 2AF09030105109DFAF0CCF58D0669AF77A5EB48314B20807FEA0B877A0C634AE80D759
                                                                                                                    APIs
                                                                                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416595
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 716092398-0
                                                                                                                    • Opcode ID: 5ff731208ea2669c00132db587fc5b09c37a3f2098bcfa82a293bed1c7b74572
                                                                                                                    • Instruction ID: bf23e32d75ed6c1bba1609a99bdb6fc4fe5539f7daeb337dc53a21feff163cdc
                                                                                                                    • Opcode Fuzzy Hash: 5ff731208ea2669c00132db587fc5b09c37a3f2098bcfa82a293bed1c7b74572
                                                                                                                    • Instruction Fuzzy Hash: 22F019B2200510AFDB84CEDCD8C0F9373ECEB0C250B0481A6BA08CB21AD220EC108BB0
                                                                                                                    APIs
                                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149FF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2492992576-0
                                                                                                                    • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                                                    • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                                                    • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                                                    • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450878
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: 2ea57b0a21c6fb2b19939c4352c8c2c80e59da93529ff7c1221b42647be5b244
                                                                                                                    • Instruction ID: ad17be180c76723165afa97522f1f8cb50e5cc3c1ac5aed9be9dbb48c14aba74
                                                                                                                    • Opcode Fuzzy Hash: 2ea57b0a21c6fb2b19939c4352c8c2c80e59da93529ff7c1221b42647be5b244
                                                                                                                    • Instruction Fuzzy Hash: D9E0EDB53441583ED6809AAC6C42F9677DC971A724F018433B998D7241D4619D258BE9
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD24,?,00000001,?,?,00000000,?,0042CD76,00000000,00452A99,00000000,00452ABA,?,00000000), ref: 0042CD07
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3188754299-0
                                                                                                                    • Opcode ID: 9c61d9913643e7fc8a87719d436576f713db19c75eb1cc22161a8dfdf450bb3f
                                                                                                                    • Instruction ID: e42bb19430493de12fff977eb98fa38a093f16e856f4d8eabd15c7f5a46843e5
                                                                                                                    • Opcode Fuzzy Hash: 9c61d9913643e7fc8a87719d436576f713db19c75eb1cc22161a8dfdf450bb3f
                                                                                                                    • Instruction Fuzzy Hash: 7DE06571314308BBD701EB62EC92A5EBAECD749714B914476B400D7592D5B86E008468
                                                                                                                    APIs
                                                                                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FormatMessage
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1306739567-0
                                                                                                                    • Opcode ID: 7e342571288affc5bafe57b4e7aa38107ccfa77ae99db5e17a7a6f0d9f50f535
                                                                                                                    • Instruction ID: 7522df6bb5b7b377145cdc83deeae8a000ac75e555bea28060da8a54cd92ba64
                                                                                                                    • Opcode Fuzzy Hash: 7e342571288affc5bafe57b4e7aa38107ccfa77ae99db5e17a7a6f0d9f50f535
                                                                                                                    • Instruction Fuzzy Hash: F6E0D86178432126F23524166C43B7B110E43C0704FD440267A809F3D2D6EE9946425E
                                                                                                                    APIs
                                                                                                                    • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AFAB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExtentPointText
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 566491939-0
                                                                                                                    • Opcode ID: 659619b104fd3feb772cd8971a1adc9358da70abd3c785c83c8eafe460c49850
                                                                                                                    • Instruction ID: cc428d1e896f501deb349ed904fe83369ead32346870d879665800f49654eebb
                                                                                                                    • Opcode Fuzzy Hash: 659619b104fd3feb772cd8971a1adc9358da70abd3c785c83c8eafe460c49850
                                                                                                                    • Instruction Fuzzy Hash: 8EE026F13092002B9200E67E1CC1C9BA7DC8A0822A300823AF808E73C2D62CCD1A03AE
                                                                                                                    APIs
                                                                                                                    • CreateWindowExA.USER32(00000000,0042368C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00406321
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 716092398-0
                                                                                                                    • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                                                    • Instruction ID: 1e3b386673cc32b76f3712ab4659b14af7d7742474b1f2ca80afcc4f691b27f6
                                                                                                                    • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                                                    • Instruction Fuzzy Hash: 26E002B221430DBFDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972528675AC608B71
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Create
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2289755597-0
                                                                                                                    • Opcode ID: 04d8f955b4ea1680ce84362706bb61212f931f51abc1de06f6e1381d22c6f23e
                                                                                                                    • Instruction ID: a58665afa9aaed36f31adbd0eb633891456326e8230674c5ed5073cd96bdc880
                                                                                                                    • Opcode Fuzzy Hash: 04d8f955b4ea1680ce84362706bb61212f931f51abc1de06f6e1381d22c6f23e
                                                                                                                    • Instruction Fuzzy Hash: DDE07EB6600119AF9B40DE8CDC81EEB37ADAB5D350F454016FA08EB200C2B8EC519BA4
                                                                                                                    APIs
                                                                                                                    • FindClose.KERNEL32(00000000,000000FF,00470B64,00000000,0047197A,?,00000000,004719C5,?,00000000,00471AFE,?,00000000,?,00000000), ref: 00454C82
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseFind
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1863332320-0
                                                                                                                    • Opcode ID: 7eca246021524149fec22f5b43aaa658f949ce3293e179ae35ef6e6ce88d0451
                                                                                                                    • Instruction ID: ed6c632c5edb2c773ab29dc4195d65b8984e4b681e68d3fe1efecde2d4089f6a
                                                                                                                    • Opcode Fuzzy Hash: 7eca246021524149fec22f5b43aaa658f949ce3293e179ae35ef6e6ce88d0451
                                                                                                                    • Instruction Fuzzy Hash: 3AE09B705056004BCB15DF3A858131A76D15FC5324F05C96AAC5CCF3D7D63C84554717
                                                                                                                    APIs
                                                                                                                    • KiUserCallbackDispatcher.NTDLL(004960BE,?,004960E0,?,?,00000000,004960BE,?,?), ref: 004146AB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2492992576-0
                                                                                                                    • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                                                    • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                                                    • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                                                    • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                                                    APIs
                                                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F34
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3934441357-0
                                                                                                                    • Opcode ID: 3762a51e43609c3b4bae8470f6c1dc5ae0f0561e9ae868b0f3c10d30521955a8
                                                                                                                    • Instruction ID: f35b24215c0fdc632c147a12649f74ed31c2b31f11cb39250bbd2ff5eed7ffe6
                                                                                                                    • Opcode Fuzzy Hash: 3762a51e43609c3b4bae8470f6c1dc5ae0f0561e9ae868b0f3c10d30521955a8
                                                                                                                    • Instruction Fuzzy Hash: 5CD012723081506AD220A65A6C44EAB6ADCCBC5770F11063AB558D2181D6209C018675
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00423608: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042361D
                                                                                                                    • ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                                                      • Part of subcall function 00423638: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423654
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoParametersSystem$ShowWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3202724764-0
                                                                                                                    • Opcode ID: 8bec8c91e4db80f916d04adf4cce8d640474384e6a809fab131d495f4cf7285d
                                                                                                                    • Instruction ID: 62f98a927e5d18dfd067733e82cc858d6425e225367395d1bb64f11078388387
                                                                                                                    • Opcode Fuzzy Hash: 8bec8c91e4db80f916d04adf4cce8d640474384e6a809fab131d495f4cf7285d
                                                                                                                    • Instruction Fuzzy Hash: 03D05E123831B03146307BB728059CB86AC8DD66AB389047BB5409B303E91D8A0A51AC
                                                                                                                    APIs
                                                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: TextWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 530164218-0
                                                                                                                    • Opcode ID: 7b629e4230a16754486ed56ae920d883ae8ae6fbac6fb4db25cd6a5c7ea909d6
                                                                                                                    • Instruction ID: 45ecccad5147b2ee88577654b541c8e67cd655c44182ff5547076257999a9e8e
                                                                                                                    • Opcode Fuzzy Hash: 7b629e4230a16754486ed56ae920d883ae8ae6fbac6fb4db25cd6a5c7ea909d6
                                                                                                                    • Instruction Fuzzy Hash: 82D05BE270116017CB01BAED54C4AC657CC5B4925A71540B7F904EF257C678CD448398
                                                                                                                    APIs
                                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,004678D0,00000000,00000000,00000000,0000000C,00000000), ref: 00466C00
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CallbackDispatcherUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2492992576-0
                                                                                                                    • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                                                    • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                                                    • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                                                    • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0045163F,00000000), ref: 0042CD3F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3188754299-0
                                                                                                                    • Opcode ID: bfa7c436ea4076489e3194c110aeffa5b63c2464b47e17bafb8d8bd18f179746
                                                                                                                    • Instruction ID: fe1bff9429d4e90dee18816d853216f65d631ba0a2a06ffe7669bbedc21dff1a
                                                                                                                    • Opcode Fuzzy Hash: bfa7c436ea4076489e3194c110aeffa5b63c2464b47e17bafb8d8bd18f179746
                                                                                                                    • Instruction Fuzzy Hash: 6FC08CE0322210169E20A6BD6CC951F06CC895837A3A40A77B03CEA2E2D23DD8162028
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6E4,0040CC90,?,00000000,?), ref: 00406EED
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: e8949a66e9203a36065e9c5356ac0ded8f2f701daa6576000ff81ed1d8cf48c0
                                                                                                                    • Instruction ID: a78e408fffc15bc8d0ee8a54c686fbaa4e2694f5c3f88f37cecd524e454749ad
                                                                                                                    • Opcode Fuzzy Hash: e8949a66e9203a36065e9c5356ac0ded8f2f701daa6576000ff81ed1d8cf48c0
                                                                                                                    • Instruction Fuzzy Hash: ADC048B13C130032F93025A61C87F1604889714B1AE60943AB740BE1C2D8E9A818016C
                                                                                                                    APIs
                                                                                                                    • SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                                                                      • Part of subcall function 00450728: GetLastError.KERNEL32(00450544,004507EA,?,00000000,?,00498504,00000001,00000000,00000002,00000000,00498665,?,?,00000005,00000000,00498699), ref: 0045072B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFileLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 734332943-0
                                                                                                                    • Opcode ID: ab92c804e13779e6a8a378971558b34dc584b681704b9a97c4630cfb3c940cd1
                                                                                                                    • Instruction ID: 0486764e065467a501855473afd0cd0cb10eaee8d6f94b4102cded937092f4df
                                                                                                                    • Opcode Fuzzy Hash: ab92c804e13779e6a8a378971558b34dc584b681704b9a97c4630cfb3c940cd1
                                                                                                                    • Instruction Fuzzy Hash: 0DC04CA9301201879F40A6AE85C190663DC9E1C3597504566B904CF20BD769DC044A14
                                                                                                                    APIs
                                                                                                                    • SetCurrentDirectoryA.KERNEL32(00000000,?,00498492,00000000,00498665,?,?,00000005,00000000,00498699,?,?,00000000), ref: 004072C3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentDirectory
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1611563598-0
                                                                                                                    • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                                                    • Instruction ID: c18bf430a4858a09d5fd0626d157798880aaaa8ea81a5298b6cf69089c3012d4
                                                                                                                    • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                                                    • Instruction Fuzzy Hash: B0B012E03D161B27CA0079FE4CC191A01CC46292163501B3A3006E71C3D83CC8080514
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(?,0042E41D), ref: 0042E410
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorMode
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2340568224-0
                                                                                                                    • Opcode ID: 28683c4ccedd275f6fd375c63a674eaf7d5950f07f4fd36cc82310e7f5762073
                                                                                                                    • Instruction ID: 55140b1eedf56d48a55774d01a07de49d55d18186a895614534630d02c3c9fff
                                                                                                                    • Opcode Fuzzy Hash: 28683c4ccedd275f6fd375c63a674eaf7d5950f07f4fd36cc82310e7f5762073
                                                                                                                    • Instruction Fuzzy Hash: D4B09B7671C6105DFB05D695745152D63D4D7C57203E14577F010D7580D53D58004D18
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DestroyWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3375834691-0
                                                                                                                    • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                                                    • Instruction ID: 951f12253bcdbe2be33f1d7372765b1b3ebb510443260a24e1bbd496af9ec3c9
                                                                                                                    • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                                                    • Instruction Fuzzy Hash: AFA002755015409ADB10E7A5C84DF7A2298BF44204FD905FA714CA7052C53CD9008A55
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 54e6278b00533fbd37ee9a008ccbf002b6a3644c608c9d01cb394214cb5b0466
                                                                                                                    • Instruction ID: 339ef80cccba5c7eac5873b70fc8c7721134c1cb18e48c6be9d277410f7c1673
                                                                                                                    • Opcode Fuzzy Hash: 54e6278b00533fbd37ee9a008ccbf002b6a3644c608c9d01cb394214cb5b0466
                                                                                                                    • Instruction Fuzzy Hash: 91518474E042499FEB01EFA9C882AAEBBF5EB49304F50407AE500A7351DB389D41CB99
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047E407,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047E3C1
                                                                                                                      • Part of subcall function 0042CA10: GetSystemMetrics.USER32(0000002A), ref: 0042CA22
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMetricsMultiSystemWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 224039744-0
                                                                                                                    • Opcode ID: 5d71ed7f78605e465d4fedccc20939528007dd55206323f19120b13c5f88598b
                                                                                                                    • Instruction ID: f91779ff8fcf2a57f01fce6343996b16dddddfd0a70f262f58e8d3032392e39f
                                                                                                                    • Opcode Fuzzy Hash: 5d71ed7f78605e465d4fedccc20939528007dd55206323f19120b13c5f88598b
                                                                                                                    • Instruction Fuzzy Hash: BC518870A00205AFD720DF9AD885B9A7BB8EB1C309F1181B7E804E73A1D7789D45CB59
                                                                                                                    APIs
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDB4,?,0042389F,00423C1C,0041EDB4), ref: 0041F3F2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4275171209-0
                                                                                                                    • Opcode ID: 2501c7b5f1b7e2a32cc088a261609a538437b101066d50b70fa7879060b37a7f
                                                                                                                    • Instruction ID: df12e3cc7205ed3866b0622d7fc8c89f1b444ce5416b62958542d3ca819b8d78
                                                                                                                    • Opcode Fuzzy Hash: 2501c7b5f1b7e2a32cc088a261609a538437b101066d50b70fa7879060b37a7f
                                                                                                                    • Instruction Fuzzy Hash: 5A1148742007069BCB10DF19C880B82FBE4EB98390B10D53BE9588B385D378E8558BA9
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(00000000,004530A1), ref: 00453083
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1452528299-0
                                                                                                                    • Opcode ID: 3dbc9b6b19259a40e1a8eccd310b33d8d478e911805451e546832dad24d45a24
                                                                                                                    • Instruction ID: 94e22d98a6c00f19aef873439ff0cfb4dcf68a684d4d060e49f788bb75b395da
                                                                                                                    • Opcode Fuzzy Hash: 3dbc9b6b19259a40e1a8eccd310b33d8d478e911805451e546832dad24d45a24
                                                                                                                    • Instruction Fuzzy Hash: 0701FC35604304AF8711DF69AC118EEBBE8DB8A76175042B7FC64D3382D6744E059764
                                                                                                                    APIs
                                                                                                                    • VirtualFree.KERNEL32(?,?,00004000,?,?,?,00001080,00005083,00401973), ref: 00401766
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1263568516-0
                                                                                                                    • Opcode ID: c2ec33a786a38e7bd0169ef8bddb7cde116ed653613200da8896670bb901eae8
                                                                                                                    • Instruction ID: be7f0be69d4b25e877c81db3c68dd302dbc4ff1700a0c49f545652be0e594e9c
                                                                                                                    • Opcode Fuzzy Hash: c2ec33a786a38e7bd0169ef8bddb7cde116ed653613200da8896670bb901eae8
                                                                                                                    • Instruction Fuzzy Hash: 1401FC766442148FC3109F29DCC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                                                    APIs
                                                                                                                    • LocalAlloc.KERNEL32(00000000,00000644,?,0049C450,004013A3,?,?,00401443,?,?,?,00001080,00005083,00401983), ref: 00401353
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocLocal
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3494564517-0
                                                                                                                    • Opcode ID: aca4d3d7ff4968b90215f13619ba70cef3d09ec9501acc259b14cf34408ebbe3
                                                                                                                    • Instruction ID: 0848adde502159ad1fd96a8234a1f6bbb828a68afa7971909c010f8acedd3e76
                                                                                                                    • Opcode Fuzzy Hash: aca4d3d7ff4968b90215f13619ba70cef3d09ec9501acc259b14cf34408ebbe3
                                                                                                                    • Instruction Fuzzy Hash: C0F058B17012018FEB24CF29D8D0A66B7E1EBA9366F20807FE9C5D77A0D3358C418B94
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2962429428-0
                                                                                                                    • Opcode ID: 6d5f4615d296fbbc3d990cf813c80aa0ea5a8011e2983691863e8f068271b578
                                                                                                                    • Instruction ID: 6160d783662a008e1f799edb03f3d460fe671c60c73369e1be62f9e55b6485aa
                                                                                                                    • Opcode Fuzzy Hash: 6d5f4615d296fbbc3d990cf813c80aa0ea5a8011e2983691863e8f068271b578
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32(?,00419000,00000000,?,?,?,00000001), ref: 0041F136
                                                                                                                    • SetErrorMode.KERNEL32(00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F152
                                                                                                                    • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F15E
                                                                                                                    • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00419000,00000000,?,?,?,00000001), ref: 0041F16C
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F19C
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1C5
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1DA
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1EF
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F204
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F219
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F22E
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F243
                                                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F258
                                                                                                                    • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F26D
                                                                                                                    • FreeLibrary.KERNEL32(00000001,?,00419000,00000000,?,?,?,00000001), ref: 0041F27F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                                                    • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                                                    • API String ID: 2323315520-3614243559
                                                                                                                    • Opcode ID: 1c05c7c472d8affb961338489b1b8cdfb1d976d7746f6af82c634f521e0a70e8
                                                                                                                    • Instruction ID: cc035a32af1c864732f55fa5d96a8ee37849f8948b3bb020ccbabec4f333c5ef
                                                                                                                    • Opcode Fuzzy Hash: 1c05c7c472d8affb961338489b1b8cdfb1d976d7746f6af82c634f521e0a70e8
                                                                                                                    • Instruction Fuzzy Hash: 953142B1740600BBD701EBB5EC86A7A3394F768724B45093BB444EB192D77C4CA98F5D
                                                                                                                    APIs
                                                                                                                    • GetTickCount.KERNEL32 ref: 004586D7
                                                                                                                    • QueryPerformanceCounter.KERNEL32(02293858,00000000,0045896A,?,?,02293858,00000000,?,00459066,?,02293858,00000000), ref: 004586E0
                                                                                                                    • GetSystemTimeAsFileTime.KERNEL32(02293858,02293858), ref: 004586EA
                                                                                                                    • GetCurrentProcessId.KERNEL32(?,02293858,00000000,0045896A,?,?,02293858,00000000,?,00459066,?,02293858,00000000), ref: 004586F3
                                                                                                                    • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 00458769
                                                                                                                    • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02293858,02293858), ref: 00458777
                                                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,0049AB24,00000003,00000000,00000000,00000000,00458926), ref: 004587BF
                                                                                                                    • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00458915,?,00000000,C0000000,00000000,0049AB24,00000003,00000000,00000000,00000000,00458926), ref: 004587F8
                                                                                                                      • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004588A1
                                                                                                                    • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 004588D7
                                                                                                                    • CloseHandle.KERNEL32(000000FF,0045891C,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045890F
                                                                                                                      • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                                                    • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                                                    • API String ID: 770386003-3271284199
                                                                                                                    • Opcode ID: a14ed359ed0144b1afd013f03df4b8901354c39244f26f88fdd5245df950650b
                                                                                                                    • Instruction ID: dce1d9d3a47b8e631bda5ef5291cfb12a825263051becb9b2fd33ba3793b7428
                                                                                                                    • Opcode Fuzzy Hash: a14ed359ed0144b1afd013f03df4b8901354c39244f26f88fdd5245df950650b
                                                                                                                    • Instruction Fuzzy Hash: 2F710470A00248AEDB10DF65CC45B9E77F4EB05709F1044AAF944FB282DB785944CF6A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004787AC: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02292C24,?,?,?,02292C24,00478970,00000000,00478A8E,?,?,?,?), ref: 004787C5
                                                                                                                      • Part of subcall function 004787AC: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004787CB
                                                                                                                      • Part of subcall function 004787AC: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292C24,?,?,?,02292C24,00478970,00000000,00478A8E,?,?,?,?), ref: 004787DE
                                                                                                                      • Part of subcall function 004787AC: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292C24,?,?,?,02292C24), ref: 00478808
                                                                                                                      • Part of subcall function 004787AC: CloseHandle.KERNEL32(00000000,?,?,?,02292C24,00478970,00000000,00478A8E,?,?,?,?), ref: 00478826
                                                                                                                      • Part of subcall function 00478884: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,00478916,?,?,?,02292C24,?,00478978,00000000,00478A8E,?,?,?,?), ref: 004788B4
                                                                                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 004789C8
                                                                                                                    • GetLastError.KERNEL32(00000000,00478A8E,?,?,?,?), ref: 004789D1
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00478A1E
                                                                                                                    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478A42
                                                                                                                    • CloseHandle.KERNEL32(00000000,00478A73,00000000,00000000,000000FF,000000FF,00000000,00478A6C,?,00000000,00478A8E,?,?,?,?), ref: 00478A66
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                                                    • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                                                    • API String ID: 883996979-221126205
                                                                                                                    • Opcode ID: b28b376a2be0868b0724ee08b6bb697a07dc67947066f4536c6a368308ef9766
                                                                                                                    • Instruction ID: 790ad9f0fbfe83bf1512199edb7142052ce1d465f1a82f053b14324264bcdb90
                                                                                                                    • Opcode Fuzzy Hash: b28b376a2be0868b0724ee08b6bb697a07dc67947066f4536c6a368308ef9766
                                                                                                                    • Instruction Fuzzy Hash: 0C3124B0A40209AEDB10EFA6C845ADEB7A8EB04318F50853FF518E7282DF7C59458B1D
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422A04
                                                                                                                    • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BCE), ref: 00422A14
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSendShowWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1631623395-0
                                                                                                                    • Opcode ID: ad20764d00b4e1bce030a3e3c27d486f6ceec107be95deacbd1ab04939794df1
                                                                                                                    • Instruction ID: 28b3b238c6a175230bfdc04dc608b83412cf05ad4dc18caa3e002023b447773b
                                                                                                                    • Opcode Fuzzy Hash: ad20764d00b4e1bce030a3e3c27d486f6ceec107be95deacbd1ab04939794df1
                                                                                                                    • Instruction Fuzzy Hash: 5D915171B04214BFDB11EFA9DA86F9D77F4AB04314F5500B6F504AB3A2CB78AE409B58
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 004183A3
                                                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 004183C0
                                                                                                                    • GetWindowRect.USER32(?), ref: 004183DC
                                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 004183EA
                                                                                                                    • GetWindowLongA.USER32(?,000000F8), ref: 004183FF
                                                                                                                    • ScreenToClient.USER32(00000000), ref: 00418408
                                                                                                                    • ScreenToClient.USER32(00000000,?), ref: 00418413
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                                                    • String ID: ,
                                                                                                                    • API String ID: 2266315723-3772416878
                                                                                                                    • Opcode ID: e1e10888711d407f8fe90eb8876dbc7d811cb5afcf9edaa6a068330facd90bcc
                                                                                                                    • Instruction ID: 83451382f6561a1cdaf4068601f89ac1c3a417dc2c2f98083d52f4ec56b04d21
                                                                                                                    • Opcode Fuzzy Hash: e1e10888711d407f8fe90eb8876dbc7d811cb5afcf9edaa6a068330facd90bcc
                                                                                                                    • Instruction Fuzzy Hash: 10112871505201ABDB00EF69C885F9B77E8AF48314F180A7EBD58DB286D738D900CB6A
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 0042F318
                                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0042F32C
                                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0042F343
                                                                                                                    • GetActiveWindow.USER32 ref: 0042F34C
                                                                                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F379
                                                                                                                    • SetActiveWindow.USER32(?,0042F4A9,00000000,?), ref: 0042F39A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ActiveLong$IconicMessage
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1633107849-0
                                                                                                                    • Opcode ID: e8f6b6a421ea1d3179e4c98d77dd5a9a956952bb32a08c7b31a1e4991f2154d2
                                                                                                                    • Instruction ID: 64d3bd35cbe97a20ddf06b1c5bb431ac215ab6611dc304e3324dca4d9728f060
                                                                                                                    • Opcode Fuzzy Hash: e8f6b6a421ea1d3179e4c98d77dd5a9a956952bb32a08c7b31a1e4991f2154d2
                                                                                                                    • Instruction Fuzzy Hash: 0E319C71A00254AFDB01EFB6DC52D6FBBB8EB0D714B9144BAB800E7291D6389D10CB68
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 0045569B
                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004556A1
                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004556BA
                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004556E1
                                                                                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004556E6
                                                                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 004556F7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                                                    • String ID: SeShutdownPrivilege
                                                                                                                    • API String ID: 107509674-3733053543
                                                                                                                    • Opcode ID: 6f0918c0c13bc2f4d4c54a185237749107d323edec97579a5aa57cfa3c3a92f6
                                                                                                                    • Instruction ID: c3cc1ea1cd3915d7a33d422d8d95032da4a52c1e989dd5dcf2427ab637b102ec
                                                                                                                    • Opcode Fuzzy Hash: 6f0918c0c13bc2f4d4c54a185237749107d323edec97579a5aa57cfa3c3a92f6
                                                                                                                    • Instruction Fuzzy Hash: F8F06870694B42B9E610A6B1CC17F3B21C89B44749F50482AFD05EA1D3D7FCD9084A7E
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D239
                                                                                                                    • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D249
                                                                                                                    • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D259
                                                                                                                    • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047FDF3,00000000,0047FE1C), ref: 0045D27E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$CryptVersion
                                                                                                                    • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                                                    • API String ID: 1951258720-508647305
                                                                                                                    • Opcode ID: e7d405a4ff4eebbc0640f86d2c220ba04bd3b21cd5ce18d39a7322497cc2147d
                                                                                                                    • Instruction ID: 61c9e43cd1f728e0e46d113f0b501511b53ff9056e95746757012e10b94b60ba
                                                                                                                    • Opcode Fuzzy Hash: e7d405a4ff4eebbc0640f86d2c220ba04bd3b21cd5ce18d39a7322497cc2147d
                                                                                                                    • Instruction Fuzzy Hash: 9EF01DF1D01700DAD314DF76AD457263796EBA831AF08807BB800D61A2D779884ADE1C
                                                                                                                    APIs
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000,00498A98,?,?,00000000,0049C628), ref: 004987D3
                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 00498856
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00498892,?,00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000), ref: 0049886E
                                                                                                                    • FindClose.KERNEL32(000000FF,00498899,00498892,?,00000000,?,00000000,004988BA,?,?,00000000,0049C628,?,00498A44,00000000,00498A98), ref: 0049888C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$AttributesCloseFirstNext
                                                                                                                    • String ID: isRS-$isRS-???.tmp
                                                                                                                    • API String ID: 134685335-3422211394
                                                                                                                    • Opcode ID: 28bd132b98551c6f559692ecd16c2fe17ea53da37e74bec03c2fb1535a725515
                                                                                                                    • Instruction ID: 01fac1220d05b00ddf84770a6e44258796d533cd1c1ae58874983c532305936c
                                                                                                                    • Opcode Fuzzy Hash: 28bd132b98551c6f559692ecd16c2fe17ea53da37e74bec03c2fb1535a725515
                                                                                                                    • Instruction Fuzzy Hash: 6631587190161C6FDF10EF66CC41ADEBBBCDB46314F5184FBA808A32A1DB389E458E64
                                                                                                                    APIs
                                                                                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004576B9
                                                                                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004576E0
                                                                                                                    • SetForegroundWindow.USER32(?), ref: 004576F1
                                                                                                                    • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,004579C9,?,00000000,00457A05), ref: 004579B4
                                                                                                                    Strings
                                                                                                                    • Cannot evaluate variable because [Code] isn't running yet, xrefs: 00457834
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                                                    • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                                                    • API String ID: 2236967946-3182603685
                                                                                                                    • Opcode ID: 77aeb0a8c7fef545e84f15dd7e0a3ea2404ede663b2c5dd9e5d361db2ccce855
                                                                                                                    • Instruction ID: bbeea18b3a5a77650d3de781f5d15eeacb1b42f9300217bc3a931905813ce4bc
                                                                                                                    • Opcode Fuzzy Hash: 77aeb0a8c7fef545e84f15dd7e0a3ea2404ede663b2c5dd9e5d361db2ccce855
                                                                                                                    • Instruction Fuzzy Hash: 64910174608204EFEB15CF65E951F5ABBF5FB4D304F2180BAE80497392C638AE05CB68
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455FF3), ref: 00455EE4
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455EEA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                                    • API String ID: 1646373207-3712701948
                                                                                                                    • Opcode ID: 6a98d8be3cefb5d1321440a09b2e8a7ab4abd71e514de144cb28141e7088ffe0
                                                                                                                    • Instruction ID: c7998eed729051dc06c2a4bfb378ba8793a5d3ea0401748e56fe411d955f0a7d
                                                                                                                    • Opcode Fuzzy Hash: 6a98d8be3cefb5d1321440a09b2e8a7ab4abd71e514de144cb28141e7088ffe0
                                                                                                                    • Instruction Fuzzy Hash: 6C417471A04659AFCF01EFA5C8929EEB7B8EF48305F504567F800F7292D67C5E098B68
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 00417D1F
                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Placement$Iconic
                                                                                                                    • String ID: ,
                                                                                                                    • API String ID: 568898626-3772416878
                                                                                                                    • Opcode ID: 3b7cc9104e2877f08458343a95692454dc034f6994d69eb5de7ebf140b23916c
                                                                                                                    • Instruction ID: 8a2405f126271a8a3f3b67151c5e9cb2aa668bd176c3c9f3f75a3d087e0924cd
                                                                                                                    • Opcode Fuzzy Hash: 3b7cc9104e2877f08458343a95692454dc034f6994d69eb5de7ebf140b23916c
                                                                                                                    • Instruction Fuzzy Hash: 90213171604208ABCF00EF69E8C0EEA77B8AF48314F05456AFD18DF346C678DD848B68
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,004643E7), ref: 00464275
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 004642BB
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00464394,?,00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 00464370
                                                                                                                    • FindClose.KERNEL32(000000FF,0046439B,00464394,?,00000000,?,00000000,004643B2,?,00000001,00000000,004643E7), ref: 0046438E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4011626565-0
                                                                                                                    • Opcode ID: 563cab9de8366674f843763c9e948430dcca3f01ced9fbc8485ee9e1ee4fa311
                                                                                                                    • Instruction ID: c8116a204d28aaa02fd5c370c7a31de16c8845058ecf0009f09d6eac0a25a6e0
                                                                                                                    • Opcode Fuzzy Hash: 563cab9de8366674f843763c9e948430dcca3f01ced9fbc8485ee9e1ee4fa311
                                                                                                                    • Instruction Fuzzy Hash: 9B415235B00A18DBCB10EF65DC95ADEB7B8EB88305F5045AAF804E7351E7389E848E59
                                                                                                                    APIs
                                                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,00463F41), ref: 00463DB5
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463E44
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00463EF6,?,00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463ED6
                                                                                                                    • FindClose.KERNEL32(000000FF,00463EFD,00463EF6,?,00000000,?,00000000,00463F14,?,00000001,00000000,00463F41), ref: 00463EF0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4011626565-0
                                                                                                                    • Opcode ID: 69f2e1586f6ced2351afb285fdbfcdcd981e29f0042588a9f0969956ff0ee026
                                                                                                                    • Instruction ID: 2cce399ef4bcfda7b326651f57ed136ac3b6341b478a121022c65868e2c33bfd
                                                                                                                    • Opcode Fuzzy Hash: 69f2e1586f6ced2351afb285fdbfcdcd981e29f0042588a9f0969956ff0ee026
                                                                                                                    • Instruction Fuzzy Hash: E341A730A006589FCB10EF65DC55ADEB7B8EB88305F4044BAF404A7381E77C9F448E59
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E966
                                                                                                                    • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E991
                                                                                                                    • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E99E
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E9A6
                                                                                                                    • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452FB3,00000000,00452FD4), ref: 0042E9AC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1177325624-0
                                                                                                                    • Opcode ID: 773152c83aac0bdef36f70cbb87e69eedcc63596d5fbaed7a562e6c35b36d289
                                                                                                                    • Instruction ID: 200206f6ebf05c62f8aab9c26c76e03d6a480d3026058df5ea69506491fbc91e
                                                                                                                    • Opcode Fuzzy Hash: 773152c83aac0bdef36f70cbb87e69eedcc63596d5fbaed7a562e6c35b36d289
                                                                                                                    • Instruction Fuzzy Hash: 34F06DB23916203AF620A17A6C86F6F018C8785B68F10423BBA14FF1D1D9A89D0655AD
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 00483E5E
                                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00483E7C
                                                                                                                    • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049D0A8,0048333A,0048336E,00000000,0048338E,?,?,?,0049D0A8), ref: 00483E9E
                                                                                                                    • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049D0A8,0048333A,0048336E,00000000,0048338E,?,?,?,0049D0A8), ref: 00483EB2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Show$IconicLong
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2754861897-0
                                                                                                                    • Opcode ID: c386378a0c7f85d1cef37335c2bccc2b04846c6b77b58c4a4d67865339b810c4
                                                                                                                    • Instruction ID: 4716aa9c85bcb67c2a447f96ffe7cd40772f798c99979f364c9f10fe2fefca1c
                                                                                                                    • Opcode Fuzzy Hash: c386378a0c7f85d1cef37335c2bccc2b04846c6b77b58c4a4d67865339b810c4
                                                                                                                    • Instruction Fuzzy Hash: 3C017C70A412416EE710BB29DC8AB6B23C45B14B09F48087BB8449B3A3DB3C9D8AC71C
                                                                                                                    APIs
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004628CC), ref: 00462850
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,004628AC,?,00000000,?,00000000,004628CC), ref: 0046288C
                                                                                                                    • FindClose.KERNEL32(000000FF,004628B3,004628AC,?,00000000,?,00000000,004628CC), ref: 004628A6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3541575487-0
                                                                                                                    • Opcode ID: d4f80b4a2fb94837fc0fbcbe12dd3d6f714ac86ba5cd5b3d43aeac8edfdaadf3
                                                                                                                    • Instruction ID: 841aaca985aa1eabcc65563c383ac57876b75d473b933154d1e9c72f52fa3cd7
                                                                                                                    • Opcode Fuzzy Hash: d4f80b4a2fb94837fc0fbcbe12dd3d6f714ac86ba5cd5b3d43aeac8edfdaadf3
                                                                                                                    • Instruction Fuzzy Hash: 3A210B31904A087FDB11FF65CD41ADEBBACDB49304F5045B7A808E32A1E67C8E44CE56
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 004241F4
                                                                                                                    • SetActiveWindow.USER32(?,?,?,?,0046CE53), ref: 00424201
                                                                                                                      • Part of subcall function 0042365C: ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                                                      • Part of subcall function 00423B24: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,022925AC,0042421A,?,?,?,?,0046CE53), ref: 00423B5F
                                                                                                                    • SetFocus.USER32(00000000,?,?,?,?,0046CE53), ref: 0042422E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ActiveFocusIconicShow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 649377781-0
                                                                                                                    • Opcode ID: 2caf509772b4e47572ac949d7f8b8f9ae0a5a4117a3619920a2f1982222ed166
                                                                                                                    • Instruction ID: c379361f86f494b348edbf52cdf1d5c809bfbf5168ad2d96a2c3ff14c6914fef
                                                                                                                    • Opcode Fuzzy Hash: 2caf509772b4e47572ac949d7f8b8f9ae0a5a4117a3619920a2f1982222ed166
                                                                                                                    • Instruction Fuzzy Hash: B3F0DA717002209BDB10AFAAD8C5B9676A8EF48344B5541BBBD09DF35BCA7CDC018768
                                                                                                                    APIs
                                                                                                                    • InitializeSecurityDescriptor.ADVAPI32(00000001,00000001), ref: 0042EE35
                                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,00000000,00000000,00000001,00000001), ref: 0042EE45
                                                                                                                    • CreateMutexA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0042EE6D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DescriptorSecurity$CreateDaclInitializeMutex
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3525989157-0
                                                                                                                    • Opcode ID: e535240892797685b4ab9d9c929302bfb3a48c93a5258e40853e85be58f26cad
                                                                                                                    • Instruction ID: b330794617a7040f76ad0da05c7b1ee5a1856395dd3e8d048ce20caf316d4231
                                                                                                                    • Opcode Fuzzy Hash: e535240892797685b4ab9d9c929302bfb3a48c93a5258e40853e85be58f26cad
                                                                                                                    • Instruction Fuzzy Hash: 18E0C0B16443007EE200EE758C82F5F76DCDB48714F00483AB654DB1C1E679D9489B96
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 00417D1F
                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D3D
                                                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D73
                                                                                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D9A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Placement$Iconic
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 568898626-0
                                                                                                                    • Opcode ID: 1c91201d2ff36bc72c7178dd8424e8fae2c9e4961405fe597c6cb80dc68efef3
                                                                                                                    • Instruction ID: ae07cbcaee7307856f0de191e02e21b90635fd34b211f34cef32728ab7ec892e
                                                                                                                    • Opcode Fuzzy Hash: 1c91201d2ff36bc72c7178dd8424e8fae2c9e4961405fe597c6cb80dc68efef3
                                                                                                                    • Instruction Fuzzy Hash: 2A017C31204108ABCB10EE59E8C1EEA73A8AF44324F054567FD08CF242D638ECC087A8
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CaptureIconic
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2277910766-0
                                                                                                                    • Opcode ID: a20d27f3b2ac0a1b3fa2ab67efc932bc7606427269a1e4b5a38f9b3ed8bb9e72
                                                                                                                    • Instruction ID: 8b244cfd74e2e9025fb133a269c9ff628bd031c9e89e3e616ef14db29f4eec50
                                                                                                                    • Opcode Fuzzy Hash: a20d27f3b2ac0a1b3fa2ab67efc932bc7606427269a1e4b5a38f9b3ed8bb9e72
                                                                                                                    • Instruction Fuzzy Hash: CBF06232304A024BDB31A72EC885AEB62F59F88368B24443FE419C7765EB7CDCD58758
                                                                                                                    APIs
                                                                                                                    • IsIconic.USER32(?), ref: 004241AB
                                                                                                                      • Part of subcall function 00423A94: EnumWindows.USER32(00423A2C), ref: 00423AB8
                                                                                                                      • Part of subcall function 00423A94: GetWindow.USER32(?,00000003), ref: 00423ACD
                                                                                                                      • Part of subcall function 00423A94: GetWindowLongA.USER32(?,000000EC), ref: 00423ADC
                                                                                                                      • Part of subcall function 00423A94: SetWindowPos.USER32(00000000,lAB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241BB,?,?,00423D83), ref: 00423B12
                                                                                                                    • SetActiveWindow.USER32(?,?,?,00423D83,00000000,0042416C), ref: 004241BF
                                                                                                                      • Part of subcall function 0042365C: ShowWindow.USER32(00410470,00000009,?,00000000,0041EDB4,0042394A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C1C), ref: 00423677
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2671590913-0
                                                                                                                    • Opcode ID: 6a9b997a6a6cf91003675646eaf443a00e7e2891d5b78c90ff096ed1e4918312
                                                                                                                    • Instruction ID: b7d9458b5e0a659a50abb462337f5bae1697c0dc3d856a04b5cc34dfb433b66f
                                                                                                                    • Opcode Fuzzy Hash: 6a9b997a6a6cf91003675646eaf443a00e7e2891d5b78c90ff096ed1e4918312
                                                                                                                    • Instruction Fuzzy Hash: 6CE01AA470010187DF00EFAADCC9B9632A8BF48304F55057ABC08CF24BDA3CC950C728
                                                                                                                    APIs
                                                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127E5), ref: 004127D3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: NtdllProc_Window
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4255912815-0
                                                                                                                    • Opcode ID: 8e873b8b5c82bc258c14262f025a038593852d0d4569c028c12fccb2f86baf91
                                                                                                                    • Instruction ID: e2daaee124a258af88011e7d59d1a34290a71591709d5bbd6185ea02eebcb9ba
                                                                                                                    • Opcode Fuzzy Hash: 8e873b8b5c82bc258c14262f025a038593852d0d4569c028c12fccb2f86baf91
                                                                                                                    • Instruction Fuzzy Hash: D851F6356082058FC710DB6AD681A9BF3E5FF98314B2482BBD824C7391D7B8EDA1C759
                                                                                                                    APIs
                                                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0047904A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: NtdllProc_Window
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4255912815-0
                                                                                                                    • Opcode ID: 2acbb7ee23148c44530fb96b869e7794becc65d69925435b63a344be70e19465
                                                                                                                    • Instruction ID: a31957f8146ee59bbe5f7cc321da5d64c206ff61d5be307610cda5dda3fb314a
                                                                                                                    • Opcode Fuzzy Hash: 2acbb7ee23148c44530fb96b869e7794becc65d69925435b63a344be70e19465
                                                                                                                    • Instruction Fuzzy Hash: 7C413575614144EFDB10CF9DC6858AAB7F6FB48310B24C996E84CDB301D739EE419B54
                                                                                                                    APIs
                                                                                                                    • ArcFourCrypt._ISCRYPT(?,?,?,0046DFA4,?,?,0046DFA4,00000000), ref: 0045D2EF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CryptFour
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2153018856-0
                                                                                                                    • Opcode ID: f72980deaa919cf0bcca330c95d094571c0b9ac3099722338076af053f3dc2d8
                                                                                                                    • Instruction ID: b6c4cc1f99ef2e52d606a12bd82df8b216d3beaef2de20ba66a0ab70ac2c171e
                                                                                                                    • Opcode Fuzzy Hash: f72980deaa919cf0bcca330c95d094571c0b9ac3099722338076af053f3dc2d8
                                                                                                                    • Instruction Fuzzy Hash: 81C09BF240420C7F65005795ECC9C77B75CE6586547404136F704831019572AC104574
                                                                                                                    APIs
                                                                                                                    • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DC14,?,0046DDF5), ref: 0045D302
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CryptFour
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2153018856-0
                                                                                                                    • Opcode ID: f277e602d1aa1d933ca60749d28492a83cf7560ca7b8b7592fc74e5de38efb5e
                                                                                                                    • Instruction ID: 163ad57823698c1276c601513e35adbc52e9ec482f3283ddef75a5d9e9809592
                                                                                                                    • Opcode Fuzzy Hash: f277e602d1aa1d933ca60749d28492a83cf7560ca7b8b7592fc74e5de38efb5e
                                                                                                                    • Instruction Fuzzy Hash: 86A002F0F803007AFD2057615E0EF26252D97D0F05F2044757306EA0D085A5A401852C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2950978760.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2950953732.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2950996328.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_10000000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                                                    • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                                                    • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                                                    • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2950978760.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2950953732.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2950996328.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_10000000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                                                    • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                                                    • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0044B678: GetVersionExA.KERNEL32(00000094), ref: 0044B695
                                                                                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F7E9,004992CA), ref: 0044B6F3
                                                                                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B70B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B71D
                                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B72F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B741
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B753
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B765
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B777
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B789
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B79B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B7AD
                                                                                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B7BF
                                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B7D1
                                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B7E3
                                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B7F5
                                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B807
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B819
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B82B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B83D
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B84F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B861
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B873
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B885
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B897
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B8A9
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B8BB
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B8CD
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B8DF
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B8F1
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B903
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B915
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B927
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B939
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B94B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B95D
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B96F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B981
                                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B993
                                                                                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B9A5
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B9B7
                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B9C9
                                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B9DB
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B9ED
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B9FF
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044BA11
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044BA23
                                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044BA35
                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044BA47
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoadVersion
                                                                                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                                                    • API String ID: 1968650500-2910565190
                                                                                                                    • Opcode ID: a839ccb9c9a861a6ca06feeaf4f5b9cf9d009b24b8deb6d9a0dd113e88dab802
                                                                                                                    • Instruction ID: 8a2f9fdf968ae37fa3cb46079294691732ee00746fcb1dbbaee87679a149b2ae
                                                                                                                    • Opcode Fuzzy Hash: a839ccb9c9a861a6ca06feeaf4f5b9cf9d009b24b8deb6d9a0dd113e88dab802
                                                                                                                    • Instruction Fuzzy Hash: D59153F0A40B51EBEB00EBB59CC6A2A37A8EB15B1471415BBB480EF295D778DC048F5D
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 0041CA50
                                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 0041CA5C
                                                                                                                    • CreateBitmap.GDI32(0041A954,?,00000001,00000001,00000000), ref: 0041CA80
                                                                                                                    • CreateCompatibleBitmap.GDI32(?,0041A954,?), ref: 0041CA90
                                                                                                                    • SelectObject.GDI32(0041CE4C,00000000), ref: 0041CAAB
                                                                                                                    • FillRect.USER32(0041CE4C,?,?), ref: 0041CAE6
                                                                                                                    • SetTextColor.GDI32(0041CE4C,00000000), ref: 0041CAFB
                                                                                                                    • SetBkColor.GDI32(0041CE4C,00000000), ref: 0041CB12
                                                                                                                    • PatBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00FF0062), ref: 0041CB28
                                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 0041CB3B
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041CB6C
                                                                                                                    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB84
                                                                                                                    • RealizePalette.GDI32(00000000), ref: 0041CB8D
                                                                                                                    • SelectPalette.GDI32(0041CE4C,00000000,00000001), ref: 0041CB9C
                                                                                                                    • RealizePalette.GDI32(0041CE4C), ref: 0041CBA5
                                                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041CBBE
                                                                                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0041CBD5
                                                                                                                    • BitBlt.GDI32(0041CE4C,00000000,00000000,0041A954,?,00000000,00000000,00000000,00CC0020), ref: 0041CBF1
                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 0041CBFE
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 0041CC14
                                                                                                                      • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 269503290-0
                                                                                                                    • Opcode ID: cce4914916f1a7239ac88c37909b2d3847b69fcced41e26916e06273e7ac86df
                                                                                                                    • Instruction ID: 4a976381369a00188f54b32674623e6c4b83415f3a667354aa154cca89d68730
                                                                                                                    • Opcode Fuzzy Hash: cce4914916f1a7239ac88c37909b2d3847b69fcced41e26916e06273e7ac86df
                                                                                                                    • Instruction Fuzzy Hash: 2C61EE71A44608AFDB10EBE9DC86FDFB7B8EF49704F14446AB504E7281D67CA940CB68
                                                                                                                    APIs
                                                                                                                    • CoCreateInstance.OLE32(0049AA74,00000000,00000001,0049A774,?,00000000,00456A8B), ref: 00456726
                                                                                                                    • CoCreateInstance.OLE32(0049A764,00000000,00000001,0049A774,?,00000000,00456A8B), ref: 0045674C
                                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 00456903
                                                                                                                    Strings
                                                                                                                    • %ProgramFiles(x86)%\, xrefs: 004567D6
                                                                                                                    • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 00456865
                                                                                                                    • CoCreateInstance, xrefs: 00456757
                                                                                                                    • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 004569AC
                                                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 004568E8
                                                                                                                    • IPersistFile::Save, xrefs: 00456A0A
                                                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 0045693A
                                                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 00456899
                                                                                                                    • {pf32}\, xrefs: 004567C6
                                                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 00456972
                                                                                                                    • IPropertyStore::Commit, xrefs: 0045698B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateInstance$FreeString
                                                                                                                    • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                                                                    • API String ID: 308859552-2363233914
                                                                                                                    • Opcode ID: 4019791116f66badce9a962934a38fe6a925263bf281427cd9e28d1a80f6db8e
                                                                                                                    • Instruction ID: 4df8bc5fd707d325f3bf8ee572e1ec6f0f953e2c79806aa5a0124fc00630fac3
                                                                                                                    • Opcode Fuzzy Hash: 4019791116f66badce9a962934a38fe6a925263bf281427cd9e28d1a80f6db8e
                                                                                                                    • Instruction Fuzzy Hash: CBB13170A00108AFDB50DFA9C985B9E7BF8AF49306F554066F804E7362DB78DD48CB69
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472EFC
                                                                                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00473017
                                                                                                                    • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 0047302D
                                                                                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00473052
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                                                    • String ID: .lnk$.pif$.url$Creating the icon.$Desktop.ini$Dest filename: %s$Successfully created the icon.$target.lnk${group}\
                                                                                                                    • API String ID: 971782779-2902529204
                                                                                                                    • Opcode ID: c8d3714330c821f44f5f542ed692b99ce225314bcf0a3c632e85185b5bf0d038
                                                                                                                    • Instruction ID: 2511324a254e809fb6cb6e6df698c04f534d896ef770860fda33365643b674db
                                                                                                                    • Opcode Fuzzy Hash: c8d3714330c821f44f5f542ed692b99ce225314bcf0a3c632e85185b5bf0d038
                                                                                                                    • Instruction Fuzzy Hash: 6FD12434A001499FDB01EFA9D582BDDBBF4EF08305F50806AF804B7392D6789E45DB69
                                                                                                                    APIs
                                                                                                                    • ShowWindow.USER32(?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000,?,004991F7,00000000,00499201,?,00000000), ref: 00498B2B
                                                                                                                    • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000,?,004991F7,00000000), ref: 00498B3E
                                                                                                                    • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000,00000000), ref: 00498B4E
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498B6F
                                                                                                                    • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498E40,?,?,00000000,?,00000000), ref: 00498B7F
                                                                                                                      • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,00456126,00000000,0045618E), ref: 0042D491
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                                                    • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                                                    • API String ID: 2000705611-3672972446
                                                                                                                    • Opcode ID: 91e92302dd04ccf1bd283404641ef03bf6b97a4a9fd2a5878dc4b21af6c4bdbe
                                                                                                                    • Instruction ID: c4cf27df87ac7a7b4ea6ef339e5ba87e8767b77ee3c6798ab53da9e3a0f24a8a
                                                                                                                    • Opcode Fuzzy Hash: 91e92302dd04ccf1bd283404641ef03bf6b97a4a9fd2a5878dc4b21af6c4bdbe
                                                                                                                    • Instruction Fuzzy Hash: 09919330A042449FDF11EB69D852FAE7BA5EB4A304F51447AF400E72D2CA7CAC05CB6D
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(00000000,0045AA3C,?,?,?,?,?,00000006,?,00000000,00497F35,?,00000000,00497FD8), ref: 0045A8EE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                                                    • API String ID: 1452528299-3112430753
                                                                                                                    • Opcode ID: 8a7e70ed7d2802cf2d1f154f993020eede7d014e1a3a8bb25d69fafc5e35e5ca
                                                                                                                    • Instruction ID: 47b20d326fd82fe6504d69cf898c82eeddf784bf4f3b73b35613650615bf039f
                                                                                                                    • Opcode Fuzzy Hash: 8a7e70ed7d2802cf2d1f154f993020eede7d014e1a3a8bb25d69fafc5e35e5ca
                                                                                                                    • Instruction Fuzzy Hash: D171A030B042546BDB00EB6988827AE7BA49F48305F50856BFC01EB383CB7CDE59C75A
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32 ref: 0045CC82
                                                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CCA2
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CCAF
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CCBC
                                                                                                                    • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CCCA
                                                                                                                      • Part of subcall function 0045CB70: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CC0F,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CBE9
                                                                                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CEBD,?,?,00000000), ref: 0045CD83
                                                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CEBD,?,?,00000000), ref: 0045CD8C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                                                    • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                                                    • API String ID: 59345061-4263478283
                                                                                                                    • Opcode ID: c6057923a5b4aa5def86807270a108e59673eb775b044adeceaa0b76775d665d
                                                                                                                    • Instruction ID: e70f229ab34f11e3bb96b7fa9db8dd957f06ce772e443448e3a5811e0bd6c06d
                                                                                                                    • Opcode Fuzzy Hash: c6057923a5b4aa5def86807270a108e59673eb775b044adeceaa0b76775d665d
                                                                                                                    • Instruction Fuzzy Hash: BA5195B1900704EFDB10DF99C881BEEB7B9EB48715F14806AF915F7282C2789945CF69
                                                                                                                    APIs
                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0041B3D3
                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0041B3DD
                                                                                                                    • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3EF
                                                                                                                    • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B406
                                                                                                                    • GetDC.USER32(00000000), ref: 0041B412
                                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B43F
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041B465
                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                                                    • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 644427674-0
                                                                                                                    • Opcode ID: a07e3cbb24df5042cba66812f0bcbe2bed2d5bf396793bbd6052f972fec3ec6c
                                                                                                                    • Instruction ID: 6b909a1540c808143a27ece7eebc35972739c5532850bae840edfb4e77f88e68
                                                                                                                    • Opcode Fuzzy Hash: a07e3cbb24df5042cba66812f0bcbe2bed2d5bf396793bbd6052f972fec3ec6c
                                                                                                                    • Instruction Fuzzy Hash: 5641CE71E44609AFDB10DAE9C846FEFB7BCEB08704F104466B614F7282C7786D408BA8
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,?,00000000,?,00000000,00454B81,?,0045AC12,00000003,00000000,00000000,00454BB8), ref: 00454A01
                                                                                                                      • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                                                    • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,00000000,?,00000004,00000000,00454ACB,?,0045AC12,00000000,00000000,?,00000000,?,00000000), ref: 00454A85
                                                                                                                    • RegQueryValueExA.ADVAPI32(0045AC12,00000000,00000000,00000000,?,00000004,00000000,00454ACB,?,0045AC12,00000000,00000000,?,00000000,?,00000000), ref: 00454AB4
                                                                                                                    Strings
                                                                                                                    • RegOpenKeyEx, xrefs: 00454984
                                                                                                                    • , xrefs: 00454972
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045491F
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454958
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: QueryValue$FormatMessageOpen
                                                                                                                    • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                                                    • API String ID: 2812809588-1577016196
                                                                                                                    • Opcode ID: ea363e332115dfb8c4c67b8ec304858bf906e1cf5f24106764d4d2bb4c48bf73
                                                                                                                    • Instruction ID: f9892de48a8f191bc49ac76cf4be280f3350b447777e8b89a87aacf0c036b8b5
                                                                                                                    • Opcode Fuzzy Hash: ea363e332115dfb8c4c67b8ec304858bf906e1cf5f24106764d4d2bb4c48bf73
                                                                                                                    • Instruction Fuzzy Hash: 31912571E44208ABDB41DB95C941BDEB7FCEB89309F10447BF900FB282D6789E458B69
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0045940C: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459549,00000000,00459701,?,00000000,00000000,00000000), ref: 00459459
                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 004595A7
                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 00459611
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459701,?,00000000,00000000,00000000), ref: 00459678
                                                                                                                    Strings
                                                                                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 004595C4
                                                                                                                    • v1.1.4322, xrefs: 0045966A
                                                                                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 0045955A
                                                                                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 0045962B
                                                                                                                    • .NET Framework not found, xrefs: 004596C5
                                                                                                                    • v4.0.30319, xrefs: 00459599
                                                                                                                    • v2.0.50727, xrefs: 00459603
                                                                                                                    • .NET Framework version %s not found, xrefs: 004596B1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Close$Open
                                                                                                                    • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                                                    • API String ID: 2976201327-446240816
                                                                                                                    • Opcode ID: dc1a9eed719738aac385137c6c32649b7aafbb0fa5d830984bf6fd88e0841277
                                                                                                                    • Instruction ID: 13449528a83cd7bd3976393389562d3fcc4363bdf2ba35ed2198dacadad7a936
                                                                                                                    • Opcode Fuzzy Hash: dc1a9eed719738aac385137c6c32649b7aafbb0fa5d830984bf6fd88e0841277
                                                                                                                    • Instruction Fuzzy Hash: FC51B135A04145EBCB01DF64C8A1BEE77A6DB89305F54447BE8019B393EB3D9E0E8B18
                                                                                                                    APIs
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00458B23
                                                                                                                    • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458B3F
                                                                                                                    • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458B4D
                                                                                                                    • GetExitCodeProcess.KERNEL32(?), ref: 00458B5E
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458BA5
                                                                                                                    • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458BC1
                                                                                                                    Strings
                                                                                                                    • Helper isn't responding; killing it., xrefs: 00458B2F
                                                                                                                    • Helper process exited., xrefs: 00458B6D
                                                                                                                    • Stopping 64-bit helper process. (PID: %u), xrefs: 00458B15
                                                                                                                    • Helper process exited with failure code: 0x%x, xrefs: 00458B8B
                                                                                                                    • Helper process exited, but failed to get exit code., xrefs: 00458B97
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                                                    • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                                                    • API String ID: 3355656108-1243109208
                                                                                                                    • Opcode ID: 580926d47f07d23538b7e0810c5f2f20b36629562999f9b1b12c58acf7172f57
                                                                                                                    • Instruction ID: 7e49c79e8349cf5087e4bea88bd9331b7e76427b7ebfc1862ecfa5aa0db55867
                                                                                                                    • Opcode Fuzzy Hash: 580926d47f07d23538b7e0810c5f2f20b36629562999f9b1b12c58acf7172f57
                                                                                                                    • Instruction Fuzzy Hash: 462162706047409BC760E77DC442B5B76D89F44305F008C2EB999E7283DF7CE8489B6A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DDF4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE20
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,00454773,?,00000000,00454837), ref: 004546C3
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,00454773,?,00000000,00454837), ref: 004547FF
                                                                                                                      • Part of subcall function 0042E8D8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,004532E7,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8F7
                                                                                                                    Strings
                                                                                                                    • RegCreateKeyEx, xrefs: 00454637
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045460B
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004545DB
                                                                                                                    • , xrefs: 00454625
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateFormatMessageQueryValue
                                                                                                                    • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                                                    • API String ID: 2481121983-1280779767
                                                                                                                    • Opcode ID: 4922b32db45267d894a4643b09a92539c43c37ba3b1ac319da150b9eb09741db
                                                                                                                    • Instruction ID: dcb2efb4518004930bb79e36ff4c26a26f41c5c3291808b61d16842317edebf7
                                                                                                                    • Opcode Fuzzy Hash: 4922b32db45267d894a4643b09a92539c43c37ba3b1ac319da150b9eb09741db
                                                                                                                    • Instruction Fuzzy Hash: E6810175A00209AFDB00EFD5C941BEEB7B9EB49305F50442AF900FB282D7789A45CB69
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00453930: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A1F
                                                                                                                      • Part of subcall function 00453930: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A2F
                                                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 004973A5
                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,004974F9), ref: 004973C6
                                                                                                                    • CreateWindowExA.USER32(00000000,STATIC,00497508,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 004973ED
                                                                                                                    • SetWindowLongA.USER32(?,000000FC,00496B80), ref: 00497400
                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000,STATIC,00497508), ref: 00497430
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 004974A4
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000), ref: 004974B0
                                                                                                                      • Part of subcall function 00453DA4: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E8B
                                                                                                                    • DestroyWindow.USER32(?,004974D3,00000000,00000000,00000000,00000000,00000000,00000097,00000000,004974CC,?,?,000000FC,00496B80,00000000,STATIC), ref: 004974C6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                                                    • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                                                    • API String ID: 1549857992-2312673372
                                                                                                                    • Opcode ID: 0ab8c79763325155dd79793700a727a6f2b3fb3e9c7f7600a3a4c1d4aca0dfea
                                                                                                                    • Instruction ID: a44cfd94a4b3d096a525e7606d5a2dde299b278b8d360b581aa2f7a861fbb15f
                                                                                                                    • Opcode Fuzzy Hash: 0ab8c79763325155dd79793700a727a6f2b3fb3e9c7f7600a3a4c1d4aca0dfea
                                                                                                                    • Instruction Fuzzy Hash: 1A414370A54208AFDF00EFA5DC52F9E7BB8EB09714F514576F900F7292D6799A00CB68
                                                                                                                    APIs
                                                                                                                    • GetActiveWindow.USER32 ref: 00462AA4
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462AB8
                                                                                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462AC5
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462AD2
                                                                                                                    • GetWindowRect.USER32(?,00000000), ref: 00462B1E
                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462B5C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                                                    • API String ID: 2610873146-3407710046
                                                                                                                    • Opcode ID: f4d6e5fad0b29dbe73c49a3dd9bbec29a3ac53327e7f71340f51527231a6598f
                                                                                                                    • Instruction ID: 79ef3469d7d3f88cabd24b86f5758d16992ed885f8e8d733778c3d92ea40af4d
                                                                                                                    • Opcode Fuzzy Hash: f4d6e5fad0b29dbe73c49a3dd9bbec29a3ac53327e7f71340f51527231a6598f
                                                                                                                    • Instruction Fuzzy Hash: F6219276B05A046BD600DE68CD81F7B3799DB88F14F09052AF944DB3C2EAB8ED004B5A
                                                                                                                    APIs
                                                                                                                    • GetActiveWindow.USER32 ref: 0042F1F4
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F208
                                                                                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F215
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F222
                                                                                                                    • GetWindowRect.USER32(?,00000000), ref: 0042F26E
                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F2AC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                                                    • API String ID: 2610873146-3407710046
                                                                                                                    • Opcode ID: 7dac0dfa7658a4558a2e8796b90453688b6c981995994b626f0caacaebe10860
                                                                                                                    • Instruction ID: cafee556b4ff86616240ec82e2754e32886365cebaf319099c414f584e750c92
                                                                                                                    • Opcode Fuzzy Hash: 7dac0dfa7658a4558a2e8796b90453688b6c981995994b626f0caacaebe10860
                                                                                                                    • Instruction Fuzzy Hash: 3421D77A704614ABD300D664DD81F3B33E4DB89B14F89057AFD40DB381DA79DC084BA9
                                                                                                                    APIs
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458EA3,?,00000000,00458F06,?,?,02293858,00000000), ref: 00458D21
                                                                                                                    • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000,00000001,00000000,00000000,00000000,00458EA3), ref: 00458D7E
                                                                                                                    • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000,00000001,00000000,00000000,00000000,00458EA3), ref: 00458D8B
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458DD7
                                                                                                                    • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458E11,?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000), ref: 00458DFD
                                                                                                                    • GetLastError.KERNEL32(?,?,00000000,00000001,00458E11,?,-00000020,0000000C,-00004034,00000014,02293858,?,00000000,00458E38,?,00000000), ref: 00458E04
                                                                                                                      • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                                                    • String ID: CreateEvent$TransactNamedPipe
                                                                                                                    • API String ID: 2182916169-3012584893
                                                                                                                    • Opcode ID: 98c2342ffc13102a86a2f4ad38db514fb9186628fbfdf3c783b7ad9eec6d73f4
                                                                                                                    • Instruction ID: b755420f5ccc64554a28e8d5f72de5b6a69c50c517f2f1d69fd7c456eb535d6c
                                                                                                                    • Opcode Fuzzy Hash: 98c2342ffc13102a86a2f4ad38db514fb9186628fbfdf3c783b7ad9eec6d73f4
                                                                                                                    • Instruction Fuzzy Hash: 4A417371A00608EFDB15DF95CD81F9EB7F9EB48715F10406AF904E7292DA789E44CB28
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456F2D,?,?,00000031,?), ref: 00456DF0
                                                                                                                    • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456DF6
                                                                                                                    • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456E43
                                                                                                                      • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                                                    • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                                                    • API String ID: 1914119943-2711329623
                                                                                                                    • Opcode ID: 7b1ec654037b0c607dfe6d04a3082381f0cbc5cf9cb070b5b8bf219295e165cb
                                                                                                                    • Instruction ID: 2b224e74544e423aed3b5227b18181137566e670263372cbc00570a3e14d3cd7
                                                                                                                    • Opcode Fuzzy Hash: 7b1ec654037b0c607dfe6d04a3082381f0cbc5cf9cb070b5b8bf219295e165cb
                                                                                                                    • Instruction Fuzzy Hash: 2B319275A00504AFDB11EFAACC42D5FB7BEEB89705752846AF804D3652DA38DD04CB28
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047EB60,00000000), ref: 0042E451
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E457
                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E52D,?,00000000,0047EB60,00000000), ref: 0042E4A5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressCloseHandleModuleProc
                                                                                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                                                    • API String ID: 4190037839-2401316094
                                                                                                                    • Opcode ID: 761438a972c1d8afd23800e57b4d549b524e079593dc70a8e3d34b505a119004
                                                                                                                    • Instruction ID: 3fe9fe372c4d794b24d5987f6434f9a2f248a379bc076d0360e6e1ac237d63e0
                                                                                                                    • Opcode Fuzzy Hash: 761438a972c1d8afd23800e57b4d549b524e079593dc70a8e3d34b505a119004
                                                                                                                    • Instruction Fuzzy Hash: 16216430B10219BBCB10EAF7DC45A9E77A8EB04308FA04877A500E7281EB7CDE459B5D
                                                                                                                    APIs
                                                                                                                    • RectVisible.GDI32(?,?), ref: 00416E23
                                                                                                                    • SaveDC.GDI32(?), ref: 00416E37
                                                                                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E5A
                                                                                                                    • RestoreDC.GDI32(?,?), ref: 00416E75
                                                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416EF5
                                                                                                                    • FrameRect.USER32(?,?,?), ref: 00416F28
                                                                                                                    • DeleteObject.GDI32(?), ref: 00416F32
                                                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416F42
                                                                                                                    • FrameRect.USER32(?,?,?), ref: 00416F75
                                                                                                                    • DeleteObject.GDI32(?), ref: 00416F7F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 375863564-0
                                                                                                                    • Opcode ID: db6c70493318213a3b2cdd544b125370fd54b269ad31cfd686a9519e7a86e3c4
                                                                                                                    • Instruction ID: c727efbf8946963a4c0451e641fd5f3f57076e2c2b79ed229a1c60f75d7412ee
                                                                                                                    • Opcode Fuzzy Hash: db6c70493318213a3b2cdd544b125370fd54b269ad31cfd686a9519e7a86e3c4
                                                                                                                    • Instruction Fuzzy Hash: A0513AB12047455FDB50EF69C8C4B9B77E8AF48314F1546AAFD488B286C738EC81CB99
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                                                    • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1694776339-0
                                                                                                                    • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                                                    • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                                                    • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                                                    • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                                                    APIs
                                                                                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 00422243
                                                                                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422261
                                                                                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226E
                                                                                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042227B
                                                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422288
                                                                                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422295
                                                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 004222A2
                                                                                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 004222AF
                                                                                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222CD
                                                                                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222E9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$Delete$EnableItem$System
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3985193851-0
                                                                                                                    • Opcode ID: b2f1750b03ba79d273c55ca6812263c276687b20c7bac49dc024d7f30c6f7dfa
                                                                                                                    • Instruction ID: efa19709b170cd1c2d0de868379c086f5835f405e594c588ded1d161c250978f
                                                                                                                    • Opcode Fuzzy Hash: b2f1750b03ba79d273c55ca6812263c276687b20c7bac49dc024d7f30c6f7dfa
                                                                                                                    • Instruction Fuzzy Hash: 112124703807447AE720E725CD8BF9B7BD89B04718F5440A9BA48BF2D3C6F9AA40865C
                                                                                                                    APIs
                                                                                                                    • FreeLibrary.KERNEL32(10000000), ref: 00481EF5
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00481F09
                                                                                                                    • SendNotifyMessageA.USER32(0002046A,00000496,00002710,00000000), ref: 00481F7B
                                                                                                                    Strings
                                                                                                                    • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481F2A
                                                                                                                    • GetCustomSetupExitCode, xrefs: 00481D95
                                                                                                                    • Deinitializing Setup., xrefs: 00481D56
                                                                                                                    • DeinitializeSetup, xrefs: 00481DF1
                                                                                                                    • Restarting Windows., xrefs: 00481F56
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeLibrary$MessageNotifySend
                                                                                                                    • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                                                    • API String ID: 3817813901-1884538726
                                                                                                                    • Opcode ID: c898f3fadde3ff7955209d5f4aceb7b29c199a3380d9c61b05ec390ed495ea4d
                                                                                                                    • Instruction ID: 9e00769445d4a0c849b2d818ef4b464354af313f5be9db4beddfa23a64d09d3b
                                                                                                                    • Opcode Fuzzy Hash: c898f3fadde3ff7955209d5f4aceb7b29c199a3380d9c61b05ec390ed495ea4d
                                                                                                                    • Instruction Fuzzy Hash: 0C518031A04200AFD715EF69D845B5E7BA8EB19318F50887BF905C72B1D738A845CB59
                                                                                                                    APIs
                                                                                                                    • SHGetMalloc.SHELL32(?), ref: 0046176F
                                                                                                                    • GetActiveWindow.USER32 ref: 004617D3
                                                                                                                    • CoInitialize.OLE32(00000000), ref: 004617E7
                                                                                                                    • SHBrowseForFolder.SHELL32(?), ref: 004617FE
                                                                                                                    • CoUninitialize.OLE32(0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461813
                                                                                                                    • SetActiveWindow.USER32(?,0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461829
                                                                                                                    • SetActiveWindow.USER32(?,?,0046183F,00000000,?,?,?,?,?,00000000,004618C3), ref: 00461832
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                                                    • String ID: A
                                                                                                                    • API String ID: 2684663990-3554254475
                                                                                                                    • Opcode ID: c8a2995f1564064eb5a34001aee608c8ce9a85b4cfccd82670955085ca8b405e
                                                                                                                    • Instruction ID: ed33581d6f83e257b2021294155b7b183ce5e349162e4ad67cdd841697ea343d
                                                                                                                    • Opcode Fuzzy Hash: c8a2995f1564064eb5a34001aee608c8ce9a85b4cfccd82670955085ca8b405e
                                                                                                                    • Instruction Fuzzy Hash: DD31F0B1E00248AFDB11EFA6D885A9EBBF8EB09304F55447BF804E7251E7785A04CB59
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000,?,00472F11,?,?,00000000,00473194), ref: 00472C18
                                                                                                                      • Part of subcall function 0042CDA4: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE1A
                                                                                                                      • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000,?,00472F11), ref: 00472C8F
                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472CB5,?,?,?,00000008,00000000,00000000,00000000), ref: 00472C95
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                                                    • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                                                    • API String ID: 884541143-1710247218
                                                                                                                    • Opcode ID: 66cca181f9b721833913324fb941b36821abb62f62904710aeac79635de6a3b1
                                                                                                                    • Instruction ID: 65975e4bd8cd76c9bb0fe38812e038ff2f06eb36f2e037c13b6dabf628133507
                                                                                                                    • Opcode Fuzzy Hash: 66cca181f9b721833913324fb941b36821abb62f62904710aeac79635de6a3b1
                                                                                                                    • Instruction Fuzzy Hash: 9511D0307005147FD712EA759E82B9E76ACDB59714F61853BB804A72C1DBBCAE02866C
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D365
                                                                                                                    • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D375
                                                                                                                    • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D385
                                                                                                                    • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D395
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc
                                                                                                                    • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                                                    • API String ID: 190572456-3516654456
                                                                                                                    • Opcode ID: dc90f1f262602021e393954f48f97557164b85cd901e8b5ff6cac9b118bc13cf
                                                                                                                    • Instruction ID: a094d50e791027cbd3930c6bcb0dd8b00ad2176992dcb97735ddb1afc71f87fe
                                                                                                                    • Opcode Fuzzy Hash: dc90f1f262602021e393954f48f97557164b85cd901e8b5ff6cac9b118bc13cf
                                                                                                                    • Instruction Fuzzy Hash: 170128B0D00700DAE324DF36AC4272636A5EFA430EF14903BAD48962B7D779485B9A2D
                                                                                                                    APIs
                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0041A9C9
                                                                                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041AA03
                                                                                                                    • SetBkColor.GDI32(?,?), ref: 0041AA18
                                                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA62
                                                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AA6D
                                                                                                                    • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA7D
                                                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AABC
                                                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AAC6
                                                                                                                    • SetBkColor.GDI32(00000000,?), ref: 0041AAD3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Color$StretchText
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2984075790-0
                                                                                                                    • Opcode ID: 346bdf56f45da54f900b88fa69c46fff65611cbab2d21c5c69379b94b51b0a6c
                                                                                                                    • Instruction ID: 3742fc556daaed9ad14d930c470d40cb5efd251a519f467f7f8e710c3ba79c5e
                                                                                                                    • Opcode Fuzzy Hash: 346bdf56f45da54f900b88fa69c46fff65611cbab2d21c5c69379b94b51b0a6c
                                                                                                                    • Instruction Fuzzy Hash: A561E5B5A00105EFCB40EFA9D985E9ABBF8EF08314B108166F518DB261CB34ED50CF99
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458320,?, /s ",?,regsvr32.exe",?,00458320), ref: 00458292
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseDirectoryHandleSystem
                                                                                                                    • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                                                    • API String ID: 2051275411-1862435767
                                                                                                                    • Opcode ID: 094f14b588af688cd7db8b552fab67cbd0f69cfd9e563acb8ae8cd2159047a0a
                                                                                                                    • Instruction ID: 3217153a075e29e22e4edd5f99a32045657764684ff44c5b21fe10df6120cd58
                                                                                                                    • Opcode Fuzzy Hash: 094f14b588af688cd7db8b552fab67cbd0f69cfd9e563acb8ae8cd2159047a0a
                                                                                                                    • Instruction Fuzzy Hash: 28411770A00308ABDB10EFD5C842BDEB7F9AF45705F50407FA904BB292DF799A098B59
                                                                                                                    APIs
                                                                                                                    • OffsetRect.USER32(?,00000001,00000001), ref: 0044D21D
                                                                                                                    • GetSysColor.USER32(00000014), ref: 0044D224
                                                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D23C
                                                                                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D265
                                                                                                                    • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D26F
                                                                                                                    • GetSysColor.USER32(00000010), ref: 0044D276
                                                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D28E
                                                                                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D2B7
                                                                                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D2E2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Text$Color$Draw$OffsetRect
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1005981011-0
                                                                                                                    • Opcode ID: 0c9f13fdac39b7e8032be21cb884e4f523a93d5be2f974ed7a515f91e2df11ad
                                                                                                                    • Instruction ID: bddce6b53f256ac6c171d17b767d3a31006e7acd236a538b09f11432ecbe9b7c
                                                                                                                    • Opcode Fuzzy Hash: 0c9f13fdac39b7e8032be21cb884e4f523a93d5be2f974ed7a515f91e2df11ad
                                                                                                                    • Instruction Fuzzy Hash: 6921AFB42015047FC710FB6ACD8AE8B7BDC9F19319B01857AB918EB392C678DE404669
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004509A0: SetEndOfFile.KERNEL32(?,?,0045C3EA,00000000,0045C575,?,00000000,00000002,00000002), ref: 004509A7
                                                                                                                      • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496C5D
                                                                                                                    • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496C71
                                                                                                                    • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00496C8B
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496C97
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496C9D
                                                                                                                    • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00496CB0
                                                                                                                    Strings
                                                                                                                    • Deleting Uninstall data files., xrefs: 00496BD3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                                                    • String ID: Deleting Uninstall data files.
                                                                                                                    • API String ID: 1570157960-2568741658
                                                                                                                    • Opcode ID: 1ff474fed9ee097c96215d717bbe635fc8fb99da6ef0c3667258a19916fdf94b
                                                                                                                    • Instruction ID: 97c3483cac018c5983fbae276c25bca061d0eb7c138ea963c76b2828a35483b6
                                                                                                                    • Opcode Fuzzy Hash: 1ff474fed9ee097c96215d717bbe635fc8fb99da6ef0c3667258a19916fdf94b
                                                                                                                    • Instruction Fuzzy Hash: A0215371704204BFEB11EB7AED42B263BA8D75975CF52443BB501971A2D67CAC01CB2D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004704F1,?,?,?,?,00000000), ref: 0047045B
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004704F1), ref: 00470472
                                                                                                                    • AddFontResourceA.GDI32(00000000), ref: 0047048F
                                                                                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004704A3
                                                                                                                    Strings
                                                                                                                    • Failed to set value in Fonts registry key., xrefs: 00470464
                                                                                                                    • Failed to open Fonts registry key., xrefs: 00470479
                                                                                                                    • AddFontResource, xrefs: 004704AD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                                                    • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                                                    • API String ID: 955540645-649663873
                                                                                                                    • Opcode ID: 38b82f5f3b64ce6b3544e272c3aeff7abd196abe9590372e985aa06f0b830a89
                                                                                                                    • Instruction ID: 7097c2831d41c9cd2ca76b8e30f6fd32102657c6dd1fb14c708e758a2e1a6bb0
                                                                                                                    • Opcode Fuzzy Hash: 38b82f5f3b64ce6b3544e272c3aeff7abd196abe9590372e985aa06f0b830a89
                                                                                                                    • Instruction Fuzzy Hash: 6421C770741204BBD710EA669C42FAE679DDB54704F50843BBA04FB3C2D67CAE05466D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00416420: GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                                                      • Part of subcall function 00416420: UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                                                      • Part of subcall function 00416420: RegisterClassA.USER32(?), ref: 004164DE
                                                                                                                    • GetVersion.KERNEL32 ref: 00462F08
                                                                                                                    • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462F46
                                                                                                                    • SHGetFileInfo.SHELL32(00462FE4,00000000,?,00000160,00004011), ref: 00462F63
                                                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 00462F81
                                                                                                                    • SetCursor.USER32(00000000,00000000,00007F02,00462FE4,00000000,?,00000160,00004011), ref: 00462F87
                                                                                                                    • SetCursor.USER32(?,00462FC7,00007F02,00462FE4,00000000,?,00000160,00004011), ref: 00462FBA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                                                    • String ID: Explorer
                                                                                                                    • API String ID: 2594429197-512347832
                                                                                                                    • Opcode ID: 96f263f28a0c5ccb9cf997cde3498094f1a70322a781246ee7820a3eb8b88b0c
                                                                                                                    • Instruction ID: e6c52dcece90e3493be9f15e0e64570b8c3e052e326357339ba6e8db1b4e70e7
                                                                                                                    • Opcode Fuzzy Hash: 96f263f28a0c5ccb9cf997cde3498094f1a70322a781246ee7820a3eb8b88b0c
                                                                                                                    • Instruction Fuzzy Hash: 80210A707447047AE714BB758D87F9A76989B04708F4004BFB609EE1C3DAFC9805966D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02292C24,?,?,?,02292C24,00478970,00000000,00478A8E,?,?,?,?), ref: 004787C5
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004787CB
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292C24,?,?,?,02292C24,00478970,00000000,00478A8E,?,?,?,?), ref: 004787DE
                                                                                                                    • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02292C24,?,?,?,02292C24), ref: 00478808
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,02292C24,00478970,00000000,00478A8E,?,?,?,?), ref: 00478826
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                                                    • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                                                    • API String ID: 2704155762-2318956294
                                                                                                                    • Opcode ID: 14f21087db484bbe1d5e4b5a8bc4cc83b4293264f889a619fd0c4b3a846a45dc
                                                                                                                    • Instruction ID: b4b4eb6e882b21a3e38edc8c56477b2b3cf7b2a6488eba7606f3a3958a626299
                                                                                                                    • Opcode Fuzzy Hash: 14f21087db484bbe1d5e4b5a8bc4cc83b4293264f889a619fd0c4b3a846a45dc
                                                                                                                    • Instruction Fuzzy Hash: A101D6717C470436E52035AB4C8AFBB654C8B50769F65813F7A5CEA2C2DEAC8D0601AF
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(00000000,0045A036,?,00000000,00000000,00000000,?,00000006,?,00000000,00497F35,?,00000000,00497FD8), ref: 00459F7A
                                                                                                                      • Part of subcall function 00454468: FindClose.KERNEL32(000000FF,0045455E), ref: 0045454D
                                                                                                                    Strings
                                                                                                                    • Deleting directory: %s, xrefs: 00459F03
                                                                                                                    • Failed to delete directory (%d). Will retry later., xrefs: 00459F93
                                                                                                                    • Failed to delete directory (%d)., xrefs: 0045A010
                                                                                                                    • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459FEF
                                                                                                                    • Stripped read-only attribute., xrefs: 00459F3C
                                                                                                                    • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459F54
                                                                                                                    • Failed to strip read-only attribute., xrefs: 00459F48
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseErrorFindLast
                                                                                                                    • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                                                    • API String ID: 754982922-1448842058
                                                                                                                    • Opcode ID: 108d6f8d37026f2bdf90fc188fb77551ed7727444c0280258668295353b09f4f
                                                                                                                    • Instruction ID: f7c933924608f42955d773fda0cc7ecec7f056cd1af039b488d7310b1683b7b3
                                                                                                                    • Opcode Fuzzy Hash: 108d6f8d37026f2bdf90fc188fb77551ed7727444c0280258668295353b09f4f
                                                                                                                    • Instruction Fuzzy Hash: 2741AF30A142459ACB14DF6988013AEBAA59F4970AF50867BAC05D73C3CB7D8D1DC75E
                                                                                                                    APIs
                                                                                                                    • GetCapture.USER32 ref: 00422EB4
                                                                                                                    • GetCapture.USER32 ref: 00422EC3
                                                                                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EC9
                                                                                                                    • ReleaseCapture.USER32 ref: 00422ECE
                                                                                                                    • GetActiveWindow.USER32 ref: 00422EDD
                                                                                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F5C
                                                                                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FC0
                                                                                                                    • GetActiveWindow.USER32 ref: 00422FCF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 862346643-0
                                                                                                                    • Opcode ID: 68a87140416b020399d93bb5315a0a21c376da3895e44649e19dd4425ce1cb21
                                                                                                                    • Instruction ID: 5ea5fd569023dc8c87c0f060f2033c8effa86d07781bc97308b393d06b21a190
                                                                                                                    • Opcode Fuzzy Hash: 68a87140416b020399d93bb5315a0a21c376da3895e44649e19dd4425ce1cb21
                                                                                                                    • Instruction Fuzzy Hash: 42414F70B00254AFDB10EB69DA82B9E77F1EF48304F5540BAF500AB292D7B89E40DB58
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 0042949A
                                                                                                                    • GetTextMetricsA.GDI32(00000000), ref: 004294A3
                                                                                                                      • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294B2
                                                                                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 004294BF
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294C6
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004294CE
                                                                                                                    • GetSystemMetrics.USER32(00000006), ref: 004294F3
                                                                                                                    • GetSystemMetrics.USER32(00000006), ref: 0042950D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1583807278-0
                                                                                                                    • Opcode ID: f653b88d646d5855613b637c91f02c053f26aae7c72922398ebfcd233ccf026a
                                                                                                                    • Instruction ID: 697d7c7282338d87a55ab62dd7e79ac53eeb01c5e9ca74f61c727bf968a75029
                                                                                                                    • Opcode Fuzzy Hash: f653b88d646d5855613b637c91f02c053f26aae7c72922398ebfcd233ccf026a
                                                                                                                    • Instruction Fuzzy Hash: 4B01E1517087113AF311767A8CC2F6F65C8CB48348F44043AFA46963D3D96C9C81872A
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 0041DE37
                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE41
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041DE4E
                                                                                                                    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE5D
                                                                                                                    • GetStockObject.GDI32(00000007), ref: 0041DE6B
                                                                                                                    • GetStockObject.GDI32(00000005), ref: 0041DE77
                                                                                                                    • GetStockObject.GDI32(0000000D), ref: 0041DE83
                                                                                                                    • LoadIconA.USER32(00000000,00007F00), ref: 0041DE94
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 225703358-0
                                                                                                                    • Opcode ID: 9e6aef158aae43a64748e55fd0ac7cd53bc5d466c5663c5b8304b383878f9cfe
                                                                                                                    • Instruction ID: 417a648a5fb8aa5baf3b27a45d37177240889d53830a96f1de9ccb55acdbe8d0
                                                                                                                    • Opcode Fuzzy Hash: 9e6aef158aae43a64748e55fd0ac7cd53bc5d466c5663c5b8304b383878f9cfe
                                                                                                                    • Instruction Fuzzy Hash: D0113D706443015AE340FFA65992BAA3690EB24709F00913FF609AF3D1DA7E1C849B6E
                                                                                                                    APIs
                                                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 004633EC
                                                                                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,00463481), ref: 004633F2
                                                                                                                    • SetCursor.USER32(?,00463469,00007F02,00000000,00463481), ref: 0046345C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Cursor$Load
                                                                                                                    • String ID: $ $Internal error: Item already expanding
                                                                                                                    • API String ID: 1675784387-1948079669
                                                                                                                    • Opcode ID: f6d1be44cf2e44268d7afd95b077db9a3be558b3ec252d02f0fd4fc7ed4407db
                                                                                                                    • Instruction ID: 22b4a0b3887aba48b6836ac3fd128682d97f720243347cd6184d65e00a263647
                                                                                                                    • Opcode Fuzzy Hash: f6d1be44cf2e44268d7afd95b077db9a3be558b3ec252d02f0fd4fc7ed4407db
                                                                                                                    • Instruction Fuzzy Hash: A1B1A230A00284EFDB21DF29C545B9ABBF0AF04305F1585AEE8459B792D778EE44CB5A
                                                                                                                    APIs
                                                                                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E8B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                                    • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                                                    • API String ID: 390214022-3304407042
                                                                                                                    • Opcode ID: 69f3bf86b6b830d495b8de3dd549e81b01dfda702afa7db40213f9dbbc84b83f
                                                                                                                    • Instruction ID: b3c584f0f22674ad0fcc633aedcec79f77295145a47899f9a0f541d7d967d7d4
                                                                                                                    • Opcode Fuzzy Hash: 69f3bf86b6b830d495b8de3dd549e81b01dfda702afa7db40213f9dbbc84b83f
                                                                                                                    • Instruction Fuzzy Hash: 9191F534E001099BDF11EFA5D881BDEB7F5EF4834AF508466E900B7292D7789E49CA58
                                                                                                                    APIs
                                                                                                                    • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 004770E5
                                                                                                                    • SetWindowLongW.USER32(00000000,000000FC,00477040), ref: 0047710C
                                                                                                                    • GetACP.KERNEL32(00000000,00477324,?,00000000,0047734E), ref: 00477149
                                                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0047718F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ClassInfoLongMessageSendWindow
                                                                                                                    • String ID: COMBOBOX$Inno Setup: Language
                                                                                                                    • API String ID: 3391662889-4234151509
                                                                                                                    • Opcode ID: 521d6e489fa1ae24faf8f78c129860c497e4f80b4a302989467673be046d20e0
                                                                                                                    • Instruction ID: 5e09237f06f7ca82dbad2e96fb5083c0fe5e5e2331f930e3c55d8b81a1e05678
                                                                                                                    • Opcode Fuzzy Hash: 521d6e489fa1ae24faf8f78c129860c497e4f80b4a302989467673be046d20e0
                                                                                                                    • Instruction Fuzzy Hash: 67814F30A042059FCB10DF69C985A9AB7F1FB49304F9481BAEC08EB362D734AD41CB99
                                                                                                                    APIs
                                                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408978,?,?,?,?,00000000,00000000,00000000,?,0040997F,00000000,00409992), ref: 0040874A
                                                                                                                      • Part of subcall function 00408578: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049C4C0,00000001,?,00408643,?,00000000,00408722), ref: 00408596
                                                                                                                      • Part of subcall function 004085C4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087C6,?,?,?,00000000,00408978), ref: 004085D7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale$DefaultSystem
                                                                                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                                                    • API String ID: 1044490935-665933166
                                                                                                                    • Opcode ID: 70ae38f132fc3d3f9053d40cb900b3f5106e9b3c11c1bc8091f0af349ffabeb6
                                                                                                                    • Instruction ID: 31fd29742738ad3ef4a1c8f63862b88eefe7a444323e1968e1f56601496a4ee9
                                                                                                                    • Opcode Fuzzy Hash: 70ae38f132fc3d3f9053d40cb900b3f5106e9b3c11c1bc8091f0af349ffabeb6
                                                                                                                    • Instruction Fuzzy Hash: 55512D74B001486BDB01FBA69D91AAE77A9DB94308F50D47FA181BB3C6CE3CDA05871D
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32(00000000,00411909), ref: 0041179C
                                                                                                                    • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041185A
                                                                                                                      • Part of subcall function 00411ABC: CreatePopupMenu.USER32 ref: 00411AD6
                                                                                                                    • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118E6
                                                                                                                      • Part of subcall function 00411ABC: CreateMenu.USER32 ref: 00411AE0
                                                                                                                    • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118CD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                                                    • String ID: ,$?
                                                                                                                    • API String ID: 2359071979-2308483597
                                                                                                                    • Opcode ID: 44383e044abff6cbf278423e894284f1520358ef4015b87050d63fd1739e3a25
                                                                                                                    • Instruction ID: c427c9b06a4b8e224850f8fd68708263cabc4ba561a0b31d0e571b4226371ffb
                                                                                                                    • Opcode Fuzzy Hash: 44383e044abff6cbf278423e894284f1520358ef4015b87050d63fd1739e3a25
                                                                                                                    • Instruction Fuzzy Hash: 0C511774A00144ABDB10EF7ADC816EA7BF9AF08304B1185BBF914E73A6D738D941CB58
                                                                                                                    APIs
                                                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF38
                                                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF47
                                                                                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF98
                                                                                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BFA6
                                                                                                                    • DeleteObject.GDI32(?), ref: 0041BFAF
                                                                                                                    • DeleteObject.GDI32(?), ref: 0041BFB8
                                                                                                                    • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFD5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1030595962-0
                                                                                                                    • Opcode ID: 5a427f00feddb577fff5167fa7821d20935eac0201827996bfcfefe2a8efdbf4
                                                                                                                    • Instruction ID: 04b97f25464b58ff436fe1885c4dd039914ee627ffefe5dec802ec1f9d3f819a
                                                                                                                    • Opcode Fuzzy Hash: 5a427f00feddb577fff5167fa7821d20935eac0201827996bfcfefe2a8efdbf4
                                                                                                                    • Instruction Fuzzy Hash: 8A510571A006199FCB14DFA9C8819EEB7F9EF48314B11442AF914E7391D738AD81CB64
                                                                                                                    APIs
                                                                                                                    • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CF0E
                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF2D
                                                                                                                    • SelectPalette.GDI32(?,?,00000001), ref: 0041CF93
                                                                                                                    • RealizePalette.GDI32(?), ref: 0041CFA2
                                                                                                                    • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041D00C
                                                                                                                    • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D04A
                                                                                                                    • SelectPalette.GDI32(?,?,00000001), ref: 0041D06F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2222416421-0
                                                                                                                    • Opcode ID: d578c5c43a151ca21ad873cc4bbf55809b48f101e43ab62b7175feda3131b2cf
                                                                                                                    • Instruction ID: 901e13b734fcfe26ab98e85b677eebf668a0bb257bdc2dc03c804f52c9ec24c8
                                                                                                                    • Opcode Fuzzy Hash: d578c5c43a151ca21ad873cc4bbf55809b48f101e43ab62b7175feda3131b2cf
                                                                                                                    • Instruction Fuzzy Hash: 47514FB0600204AFDB14DFA9C995F9BBBF9EF08304F108599B549DB292C778ED81CB58
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(00000000,?,?), ref: 004573D6
                                                                                                                      • Part of subcall function 0042428C: GetWindowTextA.USER32(?,?,00000100), ref: 004242AC
                                                                                                                      • Part of subcall function 0041EEB4: GetCurrentThreadId.KERNEL32 ref: 0041EF03
                                                                                                                      • Part of subcall function 0041EEB4: EnumThreadWindows.USER32(00000000,0041EE64,00000000), ref: 0041EF09
                                                                                                                      • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0045743D
                                                                                                                    • TranslateMessage.USER32(?), ref: 0045745B
                                                                                                                    • DispatchMessageA.USER32(?), ref: 00457464
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                                                                    • String ID: [Paused]
                                                                                                                    • API String ID: 1007367021-4230553315
                                                                                                                    • Opcode ID: 6b168901e7e1781911bc7d22981d81ae3d793b775a360e859fc7bc33357b6a45
                                                                                                                    • Instruction ID: dae39b44a8721021bfcf47da434b07c1a86f758a792d2d621748dfb7f1b1fb5a
                                                                                                                    • Opcode Fuzzy Hash: 6b168901e7e1781911bc7d22981d81ae3d793b775a360e859fc7bc33357b6a45
                                                                                                                    • Instruction Fuzzy Hash: 47319531908248AEDB11DBB5EC41BDE7FB8DB4E314F558077E800E7292D67C9909CB69
                                                                                                                    APIs
                                                                                                                    • GetCursor.USER32(00000000,0046B65F), ref: 0046B5DC
                                                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0046B5EA
                                                                                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B5F0
                                                                                                                    • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B5FA
                                                                                                                    • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B65F), ref: 0046B600
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Cursor$LoadSleep
                                                                                                                    • String ID: CheckPassword
                                                                                                                    • API String ID: 4023313301-1302249611
                                                                                                                    • Opcode ID: 58e796373b9fdc746396fa9d1da2347ca5f5e20d566bce270774f79728b0c312
                                                                                                                    • Instruction ID: 9215a56909f4d399359b4036adebcff7cd559b99f6583fb3c160e276e3804376
                                                                                                                    • Opcode Fuzzy Hash: 58e796373b9fdc746396fa9d1da2347ca5f5e20d566bce270774f79728b0c312
                                                                                                                    • Instruction Fuzzy Hash: 34318634644604AFD711EB65C889F9E7BE0EF09308F558076B9049B3A2D778AE40CB99
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00477FD0: GetWindowThreadProcessId.USER32(00000000), ref: 00477FD8
                                                                                                                      • Part of subcall function 00477FD0: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004780CF,0049D0A8,00000000), ref: 00477FEB
                                                                                                                      • Part of subcall function 00477FD0: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477FF1
                                                                                                                    • SendMessageA.USER32(00000000,0000004A,00000000,00478462), ref: 004780DD
                                                                                                                    • GetTickCount.KERNEL32 ref: 00478122
                                                                                                                    • GetTickCount.KERNEL32 ref: 0047812C
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00478181
                                                                                                                    Strings
                                                                                                                    • CallSpawnServer: Unexpected status: %d, xrefs: 0047816A
                                                                                                                    • CallSpawnServer: Unexpected response: $%x, xrefs: 00478112
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                                                    • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                                                    • API String ID: 613034392-3771334282
                                                                                                                    • Opcode ID: c7480ea5248a76885aa581e3ee921a1a12fc6fcdeb10822e96bf497bbef75b79
                                                                                                                    • Instruction ID: 23b6b6b43e2695b35219bdfabe49a415745965cef25793df2ffc6287c46841aa
                                                                                                                    • Opcode Fuzzy Hash: c7480ea5248a76885aa581e3ee921a1a12fc6fcdeb10822e96bf497bbef75b79
                                                                                                                    • Instruction Fuzzy Hash: 5F319334F402159ADB10EBB9898A7EEB6A4DF45314F50C03EB548EB382DA7C8D4587AD
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 004598E7
                                                                                                                    Strings
                                                                                                                    • Fusion.dll, xrefs: 00459887
                                                                                                                    • Failed to load .NET Framework DLL "%s", xrefs: 004598CC
                                                                                                                    • .NET Framework CreateAssemblyCache function failed, xrefs: 0045990A
                                                                                                                    • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 004598F2
                                                                                                                    • CreateAssemblyCache, xrefs: 004598DE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc
                                                                                                                    • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                                                    • API String ID: 190572456-3990135632
                                                                                                                    • Opcode ID: cec796d4e13f9bbf909e1b37fee8798d7a3cd604801f0b80e840edc89de29e45
                                                                                                                    • Instruction ID: f91bc12d19f1fe408be280579c06801c7313a3191b14845461a6c76c6493a406
                                                                                                                    • Opcode Fuzzy Hash: cec796d4e13f9bbf909e1b37fee8798d7a3cd604801f0b80e840edc89de29e45
                                                                                                                    • Instruction Fuzzy Hash: B1318470E04659ABCB01EFA5C88169EB7A8AF44315F50857EE814A7382DB389E08C799
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041C058: GetObjectA.GDI32(?,00000018), ref: 0041C065
                                                                                                                    • GetFocus.USER32 ref: 0041C178
                                                                                                                    • GetDC.USER32(?), ref: 0041C184
                                                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 0041C1A5
                                                                                                                    • RealizePalette.GDI32(?), ref: 0041C1B1
                                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1C8
                                                                                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1F0
                                                                                                                    • ReleaseDC.USER32(?,?), ref: 0041C1FD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3303097818-0
                                                                                                                    • Opcode ID: 7919d48a5b742b990554a8e16781250233d38a1b512c062c402771df9818cd79
                                                                                                                    • Instruction ID: 8ccc34f866771a30a1661531480aea9d283d3c3e19187e20a9e7c35f18d949ed
                                                                                                                    • Opcode Fuzzy Hash: 7919d48a5b742b990554a8e16781250233d38a1b512c062c402771df9818cd79
                                                                                                                    • Instruction Fuzzy Hash: 45112C71A40609BBDB10DBE9DC85FAFB7FCEB48700F54446AB514E7281D67899408B68
                                                                                                                    APIs
                                                                                                                    • GetSystemMetrics.USER32(0000000E), ref: 00418C80
                                                                                                                    • GetSystemMetrics.USER32(0000000D), ref: 00418C88
                                                                                                                    • 6F532980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C8E
                                                                                                                      • Part of subcall function 00410808: 6F52C400.COMCTL32(0049C628,000000FF,00000000,00418CBC,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 0041080C
                                                                                                                    • 6F59CB00.COMCTL32(0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CDE
                                                                                                                    • 6F59C740.COMCTL32(00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CE9
                                                                                                                    • 6F59CB00.COMCTL32(0049C628,00000001,?,?,00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000), ref: 00418CFC
                                                                                                                    • 6F530860.COMCTL32(0049C628,00418D1F,?,00000000,?,0049C628,00000000,00000000,00000000,00000000,00418D18,?,00000000,0000000D,00000000,0000000E), ref: 00418D12
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MetricsSystem$C400C740F530860F532980
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 209721339-0
                                                                                                                    • Opcode ID: ea814aff01982a735542cfcaa5f2d759ebf4f13d0bc11ea9e85cdf93c4d7c833
                                                                                                                    • Instruction ID: 86feed5bc36cb920ea04fcbc52f338b48e1a9a04039637533027038eb31c68aa
                                                                                                                    • Opcode Fuzzy Hash: ea814aff01982a735542cfcaa5f2d759ebf4f13d0bc11ea9e85cdf93c4d7c833
                                                                                                                    • Instruction Fuzzy Hash: 43114975B44304BBEB10FBA5DC83F9D73B9DB48704F6040A6B604EB2D1DAB99D808758
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00484208), ref: 004841ED
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                                                    • API String ID: 47109696-2530820420
                                                                                                                    • Opcode ID: 175cbca803adff72b6f31b0ab826ba1636993e1de56de7a73ad1c8f74136b4de
                                                                                                                    • Instruction ID: c07cac4acaa77b59f2fcd2c5e8c20c92fe22663a7df472bca0d1e55dfbcce728
                                                                                                                    • Opcode Fuzzy Hash: 175cbca803adff72b6f31b0ab826ba1636993e1de56de7a73ad1c8f74136b4de
                                                                                                                    • Instruction Fuzzy Hash: 81119334B082059AD700F7A69C0AB5E7BE8DBA5348F6148B7B800E7281E778AE41C71C
                                                                                                                    APIs
                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 0041B480
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B48F
                                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4BB
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4C9
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4D7
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 0041B4E0
                                                                                                                    • DeleteDC.GDI32(?), ref: 0041B4E9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ObjectSelect$Delete$Stretch
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1458357782-0
                                                                                                                    • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                                                    • Instruction ID: ae96c6176d6eb3f3494de580be991e563f9897aa79c0ee3e7df45ff247fef712
                                                                                                                    • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                                                    • Instruction Fuzzy Hash: 89115C72F44619ABDB10DADDD886FEFB7BCEB08704F044455B614F7282C678AD418BA8
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 00495BF1
                                                                                                                      • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00495C13
                                                                                                                    • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00496191), ref: 00495C27
                                                                                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 00495C49
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00495C66
                                                                                                                    Strings
                                                                                                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495C1E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                                                    • API String ID: 2948443157-222967699
                                                                                                                    • Opcode ID: 691ce413467488e034de834b989fc2e025067cd5002ece6e443aa881a737f8dc
                                                                                                                    • Instruction ID: 6d86e16e7996164c3d99a70d64bcdfbf35cb9465fd6ee9b2fa75eb6a08a4ab21
                                                                                                                    • Opcode Fuzzy Hash: 691ce413467488e034de834b989fc2e025067cd5002ece6e443aa881a737f8dc
                                                                                                                    • Instruction Fuzzy Hash: 05016176A04709ABDB05DBA98C41E5FB7ECDB49704F21047ABA00E7691D678AE008B28
                                                                                                                    APIs
                                                                                                                    • GetCursorPos.USER32 ref: 004233BF
                                                                                                                    • WindowFromPoint.USER32(?,?), ref: 004233CC
                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233DA
                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 004233E1
                                                                                                                    • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233FA
                                                                                                                    • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423411
                                                                                                                    • SetCursor.USER32(00000000), ref: 00423423
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1770779139-0
                                                                                                                    • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                                                    • Instruction ID: 0489214c39e5746bc568676ade8a3ee1219ea943f6d585d977b545401c7ee2ca
                                                                                                                    • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                                                    • Instruction Fuzzy Hash: 2001D42230562036D6217B795C86E2F22A8CB85B65F50447FB645BB283D93D8C00537D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00495A14
                                                                                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495A21
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495A2E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                    • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                                                    • API String ID: 667068680-2254406584
                                                                                                                    • Opcode ID: 3c8b88976e6e67713f1e6fb0365be4ac33276af7b519073db6005e1fda00490b
                                                                                                                    • Instruction ID: 6bb6bd91ed17cc43c826bdde37d3733eb090f1301ce7563d8f1f25412fa62683
                                                                                                                    • Opcode Fuzzy Hash: 3c8b88976e6e67713f1e6fb0365be4ac33276af7b519073db6005e1fda00490b
                                                                                                                    • Instruction Fuzzy Hash: 0AF0F6A2B42F1526DA1161760CC1B7F698CCF81760F680237BD45A7382E96C8D0543AD
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D739
                                                                                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D749
                                                                                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D759
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc
                                                                                                                    • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                                                    • API String ID: 190572456-212574377
                                                                                                                    • Opcode ID: 575c4cb06a2452c1401fa841c1313ffc0221effe76d11e7dd1aabe4620aafca8
                                                                                                                    • Instruction ID: 6c96be05a1394ea18707f7eb6152f5503904c11dec58d168239e3d414ffdbae6
                                                                                                                    • Opcode Fuzzy Hash: 575c4cb06a2452c1401fa841c1313ffc0221effe76d11e7dd1aabe4620aafca8
                                                                                                                    • Instruction Fuzzy Hash: 6FF0D0B0D00600DFE724EF369C8672736D5ABA871EF54943BA9499526AD778084ECE1C
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000,004817AB), ref: 0042EA45
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA4B
                                                                                                                    • InterlockedExchange.KERNEL32(0049C668,00000001), ref: 0042EA5C
                                                                                                                      • Part of subcall function 0042E9BC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042E9D2
                                                                                                                      • Part of subcall function 0042E9BC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                                                                      • Part of subcall function 0042E9BC: InterlockedExchange.KERNEL32(0049C660,00000001), ref: 0042E9E9
                                                                                                                    • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042EA70
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                                                    • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                                                    • API String ID: 142928637-2676053874
                                                                                                                    • Opcode ID: 1a4120a275a7a58fb50942f7be9802eb4510f593f9b94c8c2bcf046027c2ff71
                                                                                                                    • Instruction ID: ee3a30ffd41cbbfe6d6edcae89b7e54a60ed140ac131bcc27b6a733ad903a47d
                                                                                                                    • Opcode Fuzzy Hash: 1a4120a275a7a58fb50942f7be9802eb4510f593f9b94c8c2bcf046027c2ff71
                                                                                                                    • Instruction Fuzzy Hash: 7FE06DA1741620BAEA10B7B66CC6FAA2668AB18B19F50103BF100A51D1C2BD0C80CA5D
                                                                                                                    APIs
                                                                                                                    • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F0FD), ref: 0044C85F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C870
                                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C880
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                    • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                                                    • API String ID: 2238633743-1050967733
                                                                                                                    • Opcode ID: 09135f5945541ae78a6af7b678b7c17e974eae42bf5bb0e3fde62042262af164
                                                                                                                    • Instruction ID: 3dac3c94951c3f326fc139052019a1d9618f5d358237ac6f028f958aa2bdce3c
                                                                                                                    • Opcode Fuzzy Hash: 09135f5945541ae78a6af7b678b7c17e974eae42bf5bb0e3fde62042262af164
                                                                                                                    • Instruction Fuzzy Hash: E6F01CB02823068BF750BBB1ECC5B263294E76570AF18117BA001A62E2D7BD4888CF1C
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,004992FC), ref: 00479062
                                                                                                                    • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 0047906F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 0047907F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                    • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                                                    • API String ID: 667068680-222143506
                                                                                                                    • Opcode ID: f2527f3e8acae3901293ffe8f3822438352d858e28b091300cd7299335f6a370
                                                                                                                    • Instruction ID: fd16aae75e34d792cc346ba171bb4a4eccdb771972da16ee3cf818c899e4fb82
                                                                                                                    • Opcode Fuzzy Hash: f2527f3e8acae3901293ffe8f3822438352d858e28b091300cd7299335f6a370
                                                                                                                    • Instruction Fuzzy Hash: F3C012F0A50740E9DA00B7B11CC3E7B256CD540B28720803B748D75183D57C0C044F3C
                                                                                                                    APIs
                                                                                                                    • GetFocus.USER32 ref: 0041B755
                                                                                                                    • GetDC.USER32(?), ref: 0041B761
                                                                                                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B796
                                                                                                                    • RealizePalette.GDI32(00000000), ref: 0041B7A2
                                                                                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7D0
                                                                                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B804
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3275473261-0
                                                                                                                    • Opcode ID: c0b27d3b7a66d9be5bed6a7f47b95188f2d45c1e9081e04c5e1905c96dbfd583
                                                                                                                    • Instruction ID: a2c5ddb66569cb6b77bb8b351ce757b8a6afb07cbb9f01b77a2eee85226ebd67
                                                                                                                    • Opcode Fuzzy Hash: c0b27d3b7a66d9be5bed6a7f47b95188f2d45c1e9081e04c5e1905c96dbfd583
                                                                                                                    • Instruction Fuzzy Hash: BB512F74A00208DFCB11DFA9C855AEEBBB9FF49704F104066F504A7390D7789981CBA9
                                                                                                                    APIs
                                                                                                                    • GetFocus.USER32 ref: 0041BA27
                                                                                                                    • GetDC.USER32(?), ref: 0041BA33
                                                                                                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA6D
                                                                                                                    • RealizePalette.GDI32(00000000), ref: 0041BA79
                                                                                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA9D
                                                                                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAD1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3275473261-0
                                                                                                                    • Opcode ID: 2ce40bb40bbcf4fda08707fe581e59aceef162c3ea3b02671fd4d2ee797de512
                                                                                                                    • Instruction ID: 9811d2e4aff7790a224b19fb8c07a8c8a8d7caa6f03daf8ca787c0bc2bb5238d
                                                                                                                    • Opcode Fuzzy Hash: 2ce40bb40bbcf4fda08707fe581e59aceef162c3ea3b02671fd4d2ee797de512
                                                                                                                    • Instruction Fuzzy Hash: 48512974A002189FCB11DFA9C891AAEBBF9FF48700F15806AF504EB751D7789D40CBA4
                                                                                                                    APIs
                                                                                                                    • GetFocus.USER32 ref: 0041B58E
                                                                                                                    • GetDC.USER32(?), ref: 0041B59A
                                                                                                                    • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5B6
                                                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5D3
                                                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5EA
                                                                                                                    • ReleaseDC.USER32(?,?), ref: 0041B636
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2502006586-0
                                                                                                                    • Opcode ID: 93cc6d3c32f59bb0d3866a424ed22eeeeb8d669c97e98ac0717914e792a0e722
                                                                                                                    • Instruction ID: 54132ba296c0afcfcf6bcc6108250e3b4accff89e00e7de8f4d517709d1e9298
                                                                                                                    • Opcode Fuzzy Hash: 93cc6d3c32f59bb0d3866a424ed22eeeeb8d669c97e98ac0717914e792a0e722
                                                                                                                    • Instruction Fuzzy Hash: CF41D571A04258AFCB10DFA9C885A9FBBB4EF55704F1484AAF500EB351D3389D11CBA5
                                                                                                                    APIs
                                                                                                                    • SetLastError.KERNEL32(00000057,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D15F
                                                                                                                    • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D22C,?,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D19E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                                                    • API String ID: 1452528299-1580325520
                                                                                                                    • Opcode ID: e5d6d334a763e1cbb8f1666fe6de59715d05f57489b5bab2b54e19ba110a4e8d
                                                                                                                    • Instruction ID: 7b2924e434c2d2a6e8a64b45c898520acf8211660a530507fefc98e5318dd698
                                                                                                                    • Opcode Fuzzy Hash: e5d6d334a763e1cbb8f1666fe6de59715d05f57489b5bab2b54e19ba110a4e8d
                                                                                                                    • Instruction Fuzzy Hash: C911D535A04A04AFDB31DEA1C941A9E76ADDF44306F6040777C00A2783D63C9F0AD52E
                                                                                                                    APIs
                                                                                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BDE5
                                                                                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BDEF
                                                                                                                    • GetDC.USER32(00000000), ref: 0041BDF9
                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE20
                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE2D
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041BE66
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CapsDeviceMetricsSystem$Release
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 447804332-0
                                                                                                                    • Opcode ID: e7ae0f99dd269f353d7b7641ed485f387b8aeae4be2e5651bec5d04fa653b95a
                                                                                                                    • Instruction ID: e886330f15f7a5316131e86c26d6fb078e3572472e198ea0fe97a07bc4f3c0b5
                                                                                                                    • Opcode Fuzzy Hash: e7ae0f99dd269f353d7b7641ed485f387b8aeae4be2e5651bec5d04fa653b95a
                                                                                                                    • Instruction Fuzzy Hash: 54212A74E04748AFEB00EFA9C942BEEB7B4EB48714F10842AF514B7781D7785940CBA9
                                                                                                                    APIs
                                                                                                                    • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,00401B68), ref: 00401ABD
                                                                                                                    • LocalFree.KERNEL32(00708E60,00000000,00401B68), ref: 00401ACF
                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,00708E60,00000000,00401B68), ref: 00401AEE
                                                                                                                    • LocalFree.KERNEL32(00709E60,?,00000000,00008000,00708E60,00000000,00401B68), ref: 00401B2D
                                                                                                                    • RtlLeaveCriticalSection.KERNEL32(0049C420,00401B6F), ref: 00401B58
                                                                                                                    • RtlDeleteCriticalSection.KERNEL32(0049C420,00401B6F), ref: 00401B62
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3782394904-0
                                                                                                                    • Opcode ID: 881435858a3df7288aae927e3c0e93e2fd7e3e12d101c835c3d014fcf42cc859
                                                                                                                    • Instruction ID: ece8596464e12e4b83b5bd96c0fd07c419ca8ccd111934747786d766a0fa6b25
                                                                                                                    • Opcode Fuzzy Hash: 881435858a3df7288aae927e3c0e93e2fd7e3e12d101c835c3d014fcf42cc859
                                                                                                                    • Instruction Fuzzy Hash: AC119D30B403405BEB15ABA59CE2B363BE4A765708F94007BF40067AF1D67C984087AE
                                                                                                                    APIs
                                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047EBEA
                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CE49), ref: 0047EC10
                                                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047EC20
                                                                                                                    • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047EC41
                                                                                                                    • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047EC55
                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047EC71
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Long$Show
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3609083571-0
                                                                                                                    • Opcode ID: 5cd40674e0b8a30ca8b6933e71840c0df1b24ef64ec96d3901f5dc784d2e9b41
                                                                                                                    • Instruction ID: c412bc1a630f4fb8f5d2bcb23b9cdd23b166c0171215975471963c460da52ad8
                                                                                                                    • Opcode Fuzzy Hash: 5cd40674e0b8a30ca8b6933e71840c0df1b24ef64ec96d3901f5dc784d2e9b41
                                                                                                                    • Instruction Fuzzy Hash: 13014CB6651210AFD710DB69CE85F2637D8AB0D330F0946A6B549EF2E3C228DC408B08
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041A6F0: CreateBrushIndirect.GDI32 ref: 0041A75B
                                                                                                                    • UnrealizeObject.GDI32(00000000), ref: 0041B28C
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B29E
                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2C1
                                                                                                                    • SetBkMode.GDI32(?,00000002), ref: 0041B2CC
                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2E7
                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 0041B2F2
                                                                                                                      • Part of subcall function 0041A068: GetSysColor.USER32(?), ref: 0041A072
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3527656728-0
                                                                                                                    • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                                                    • Instruction ID: f7789479bb42d6d63a82e92436423a6fea40f6b6a905c0023d8cad956bbacbbe
                                                                                                                    • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                                                    • Instruction Fuzzy Hash: BAF072B56015019BDE00FFBAD9CAE4B77989F043097088457B944DF197C97DD8548B3D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                                    • ShowWindow.USER32(?,00000005,00000000,00498699,?,?,00000000), ref: 0049846A
                                                                                                                      • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                                                      • Part of subcall function 004072B8: SetCurrentDirectoryA.KERNEL32(00000000,?,00498492,00000000,00498665,?,?,00000005,00000000,00498699,?,?,00000000), ref: 004072C3
                                                                                                                      • Part of subcall function 0042D45C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4EA,?,?,?,00000001,?,00456126,00000000,0045618E), ref: 0042D491
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                                                    • String ID: .dat$.msg$IMsg$Uninstall
                                                                                                                    • API String ID: 3312786188-1660910688
                                                                                                                    • Opcode ID: 9dccf75c53f7f3cca1dc1e45017c6a23ce3ff908e08cd1c52ac55b79a990f213
                                                                                                                    • Instruction ID: 94d9a00f42835dc9211730c265b92997509a8ce46d72803125f61036d3c10121
                                                                                                                    • Opcode Fuzzy Hash: 9dccf75c53f7f3cca1dc1e45017c6a23ce3ff908e08cd1c52ac55b79a990f213
                                                                                                                    • Instruction Fuzzy Hash: 22315574A00114AFCB00FF69DC52D9EBBB5EB49318F51847AF810AB751DB39AD04CB58
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EAEA
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAF0
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB19
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                                                    • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                                                    • API String ID: 828529508-2866557904
                                                                                                                    • Opcode ID: d7b5e8f06d25cf2e82843ddd2a686aee5f6cfebd975f7e169ae89c51933d11b0
                                                                                                                    • Instruction ID: 8013201a01c1a3ce4b1282a4ea415291a3823007c30eea77c81bb12cf145ddb4
                                                                                                                    • Opcode Fuzzy Hash: d7b5e8f06d25cf2e82843ddd2a686aee5f6cfebd975f7e169ae89c51933d11b0
                                                                                                                    • Instruction Fuzzy Hash: 34F0C8D174066137E620A57F9C83F6B598C8F94759F140436F109E62C1D96C9905426E
                                                                                                                    APIs
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 004580D0
                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 004580F1
                                                                                                                    • CloseHandle.KERNEL32(?,00458124), ref: 00458117
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                                                    • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                                                    • API String ID: 2573145106-3235461205
                                                                                                                    • Opcode ID: 48654442b45b242062e68cf3d97dab4c0ed917fb54e1286c856b08e600caecae
                                                                                                                    • Instruction ID: eff4a35bea7a62289d80d9c26220f44f895e3d9a2531d43f7f7dfd5bd268873c
                                                                                                                    • Opcode Fuzzy Hash: 48654442b45b242062e68cf3d97dab4c0ed917fb54e1286c856b08e600caecae
                                                                                                                    • Instruction Fuzzy Hash: C401A230600604AFDB10EBA98C42E2E73A8EB49755F10457ABC10E73C3EE389D059B18
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA80,00000004,0049A934,00457299,0045763C,004571F0,00000000,00000B06,00000000,00000000,00000000,00000002,00000000), ref: 0042E9D2
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9D8
                                                                                                                    • InterlockedExchange.KERNEL32(0049C660,00000001), ref: 0042E9E9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                                                    • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                                                    • API String ID: 3478007392-2498399450
                                                                                                                    • Opcode ID: 29e3fe99fd39411a87420eaca3bfaa87a3f8c8d91b56c7102c175830130eccb1
                                                                                                                    • Instruction ID: c49eaaa8fdb071360f38502b50e3c23bad510ecb3814e64996c12b789333cacc
                                                                                                                    • Opcode Fuzzy Hash: 29e3fe99fd39411a87420eaca3bfaa87a3f8c8d91b56c7102c175830130eccb1
                                                                                                                    • Instruction Fuzzy Hash: 78E0ECB1740314AAEA10AB62AECBF662558AB24F19F902437F101B51E2C7FC0C84C92D
                                                                                                                    APIs
                                                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00477FD8
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,004780CF,0049D0A8,00000000), ref: 00477FEB
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477FF1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                                                    • String ID: AllowSetForegroundWindow$user32.dll
                                                                                                                    • API String ID: 1782028327-3855017861
                                                                                                                    • Opcode ID: 4365f07802c1d4a062b6a547225ad7893818e73781abac978e1d5f5c77ef267c
                                                                                                                    • Instruction ID: f8b3738cd9567d8133e7bb9c55c493c63169bafd132c11812e06eb582868bf74
                                                                                                                    • Opcode Fuzzy Hash: 4365f07802c1d4a062b6a547225ad7893818e73781abac978e1d5f5c77ef267c
                                                                                                                    • Instruction Fuzzy Hash: 92D0C7B168074165D95073B54D4EF9F225C9A4471C715C83FB548E2185DE7CD809457D
                                                                                                                    APIs
                                                                                                                    • BeginPaint.USER32(00000000,?), ref: 00416C62
                                                                                                                    • SaveDC.GDI32(?), ref: 00416C93
                                                                                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D55), ref: 00416CF4
                                                                                                                    • RestoreDC.GDI32(?,?), ref: 00416D1B
                                                                                                                    • EndPaint.USER32(00000000,?,00416D5C,00000000,00416D55), ref: 00416D4F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3808407030-0
                                                                                                                    • Opcode ID: 6e943c95b49c6f236292f7e3f4c968b2c26fc47392d5a45f7d0b8c39400a8a14
                                                                                                                    • Instruction ID: fd6e93c78d11005d9ba704e8aa7896ba8bfa997e2438936ed7ae042a7726967b
                                                                                                                    • Opcode Fuzzy Hash: 6e943c95b49c6f236292f7e3f4c968b2c26fc47392d5a45f7d0b8c39400a8a14
                                                                                                                    • Instruction Fuzzy Hash: 67411C70A04204AFDB04DB99D985FAAB7F9FF48304F1680AEE4059B362D778ED45CB58
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                                                    • Instruction ID: fc599d946787c0506e623d191f8eefd10b4a308858d20a9272ac2d3790a9447e
                                                                                                                    • Opcode Fuzzy Hash: 26890b3473d1de9ad500ea3210d514958385b88118080daeb4b5d2349ec22244
                                                                                                                    • Instruction Fuzzy Hash: A1314F746047449FC320EF69C984BABB7E8AF89314F04891EF9D9C3752C638EC858B19
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429818
                                                                                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429847
                                                                                                                    • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429863
                                                                                                                    • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042988E
                                                                                                                    • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 004298AC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3850602802-0
                                                                                                                    • Opcode ID: 37c779b953a04f4a12efe840b5dae96d6b1eda754ba999e5db1c97090b84cbca
                                                                                                                    • Instruction ID: 3a43d17cedf841754d2741ff269161da15bdaac6ac028e7563c87cbc4d8d060b
                                                                                                                    • Opcode Fuzzy Hash: 37c779b953a04f4a12efe840b5dae96d6b1eda754ba999e5db1c97090b84cbca
                                                                                                                    • Instruction Fuzzy Hash: 87219D707507057AE710BB66CC82F5B76ECEB41708F94043EB541AB2D2DF78AD41861C
                                                                                                                    APIs
                                                                                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BBDA
                                                                                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BBE4
                                                                                                                    • GetDC.USER32(00000000), ref: 0041BC22
                                                                                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC69
                                                                                                                    • DeleteObject.GDI32(00000000), ref: 0041BCAA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1095203571-0
                                                                                                                    • Opcode ID: 6e5f92cac6927d4c8622965cf5499bf0577c4e8cc05c04df1912703be0f6a612
                                                                                                                    • Instruction ID: c69e797babd58ff3ff02391fbdd927ad6b6ed61c45feb1cc22c7e7fbd0aaf132
                                                                                                                    • Opcode Fuzzy Hash: 6e5f92cac6927d4c8622965cf5499bf0577c4e8cc05c04df1912703be0f6a612
                                                                                                                    • Instruction Fuzzy Hash: BA314F74E00209EFDB04DFA5CA41AAEB7F5EB48700F1185AAF514AB381D7789E40DB98
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0045D0F4: SetLastError.KERNEL32(00000057,00000000,0045D1C0,?,?,?,?,00000000), ref: 0045D15F
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00473AE8,?,?,0049D1E0,00000000), ref: 00473AA1
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00473AE8,?,?,0049D1E0,00000000), ref: 00473AB7
                                                                                                                    Strings
                                                                                                                    • Setting permissions on registry key: %s\%s, xrefs: 00473A66
                                                                                                                    • Could not set permissions on the registry key because it currently does not exist., xrefs: 00473AAB
                                                                                                                    • Failed to set permissions on registry key (%d)., xrefs: 00473AC8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                                                    • API String ID: 1452528299-4018462623
                                                                                                                    • Opcode ID: 4607364518860baa8c25b99786c39b8e95e77fc7ad03eb8564835eea2eb2ed49
                                                                                                                    • Instruction ID: 0b47f7c1dfc919aadf9eca7aecddead5c0e22d63d641398338859fb193043b06
                                                                                                                    • Opcode Fuzzy Hash: 4607364518860baa8c25b99786c39b8e95e77fc7ad03eb8564835eea2eb2ed49
                                                                                                                    • Instruction Fuzzy Hash: 29219570A042445FCB10DFA9D8426EEBBE8EF49315F50817BE448E7392D7785E05CBA9
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 262959230-0
                                                                                                                    • Opcode ID: 353a0757e9fd9d11b623670cfd803f5b8829311614747a855f6672fd601e9639
                                                                                                                    • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                                                    • Opcode Fuzzy Hash: 353a0757e9fd9d11b623670cfd803f5b8829311614747a855f6672fd601e9639
                                                                                                                    • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                                                    APIs
                                                                                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414429
                                                                                                                    • RealizePalette.GDI32(00000000), ref: 00414431
                                                                                                                    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414445
                                                                                                                    • RealizePalette.GDI32(00000000), ref: 0041444B
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00414456
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Palette$RealizeSelect$Release
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2261976640-0
                                                                                                                    • Opcode ID: c27572ba3b318a97157e2ff630850643e717ce291e632f808275401916b3f835
                                                                                                                    • Instruction ID: 45e707893e7549553209a356c9d37de8c9d5e61d21803148832d8e75357fff83
                                                                                                                    • Opcode Fuzzy Hash: c27572ba3b318a97157e2ff630850643e717ce291e632f808275401916b3f835
                                                                                                                    • Instruction Fuzzy Hash: 6B01D47120C3806AD600A63D8C85A9F6BEC8FC6318F05946EF584DB3C2C979C8008761
                                                                                                                    APIs
                                                                                                                    • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407013
                                                                                                                    • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040708D
                                                                                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070E5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Enum$NameOpenResourceUniversal
                                                                                                                    • String ID: Z
                                                                                                                    • API String ID: 3604996873-1505515367
                                                                                                                    • Opcode ID: 33049c7ea11c30121095e337e56ababc2e5377dae656412ba48cd4e8f0b87484
                                                                                                                    • Instruction ID: bcee853a6b72702f38c87c8f124e100014cbe8ba86cd5f63ed9636da07a90c42
                                                                                                                    • Opcode Fuzzy Hash: 33049c7ea11c30121095e337e56ababc2e5377dae656412ba48cd4e8f0b87484
                                                                                                                    • Instruction Fuzzy Hash: 1C515170E042089FDB15DF65C941A9EBBB9EF09304F1081BAE900BB3D1D778AE458F5A
                                                                                                                    APIs
                                                                                                                    • SetRectEmpty.USER32(?), ref: 0044D0C2
                                                                                                                    • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D0ED
                                                                                                                    • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D175
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DrawText$EmptyRect
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 182455014-2867612384
                                                                                                                    • Opcode ID: 6196a861e208648b27b20abb2373d7b11b2b7b03d09eecf030d190a78f0ec511
                                                                                                                    • Instruction ID: 523be4b6c2791812100f8c37f9dfaf26ef338fc18bb75760613781b343a57c3a
                                                                                                                    • Opcode Fuzzy Hash: 6196a861e208648b27b20abb2373d7b11b2b7b03d09eecf030d190a78f0ec511
                                                                                                                    • Instruction Fuzzy Hash: 5E516170E00248AFEB11DFA9C885BDEBBF9BF49304F14447AE845EB252D7789944CB64
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 0042EFFE
                                                                                                                      • Part of subcall function 0041A1F8: CreateFontIndirectA.GDI32(?), ref: 0041A2B7
                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0042F021
                                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0042F100
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFontIndirectObjectReleaseSelect
                                                                                                                    • String ID: ...\
                                                                                                                    • API String ID: 3133960002-983595016
                                                                                                                    • Opcode ID: c0d9c5121ec3aa9e9e44613710b25e7259c00030b0a3b9e9a82ef93a81d8c198
                                                                                                                    • Instruction ID: fc9511131d6b73f8b5d25d5b58e31b0db863437dcfa52910c3569242d90b8927
                                                                                                                    • Opcode Fuzzy Hash: c0d9c5121ec3aa9e9e44613710b25e7259c00030b0a3b9e9a82ef93a81d8c198
                                                                                                                    • Instruction Fuzzy Hash: C6316370B00128ABDB11DF96D841BAEB7F8EB48704FD1447BF410A7292D7785E45CA59
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A1F
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,004974F9,_iu,?,00000000,00453A6A), ref: 00453A2F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateFileHandle
                                                                                                                    • String ID: .tmp$_iu
                                                                                                                    • API String ID: 3498533004-10593223
                                                                                                                    • Opcode ID: f4bf8c45f7033f3331564d27c18b43533cfc8535b408c23d1883a19ba3932c6e
                                                                                                                    • Instruction ID: b5244aac63c968e20baa0947e479141d383441796118bbd3b2ad3f6bf7aa4b2b
                                                                                                                    • Opcode Fuzzy Hash: f4bf8c45f7033f3331564d27c18b43533cfc8535b408c23d1883a19ba3932c6e
                                                                                                                    • Instruction Fuzzy Hash: 94319770E40149ABCB01EFA5C942B9EFBB5AF44349F60447AF840B72C2D7785F058A99
                                                                                                                    APIs
                                                                                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 0041648F
                                                                                                                    • UnregisterClassA.USER32(?,00400000), ref: 004164BB
                                                                                                                    • RegisterClassA.USER32(?), ref: 004164DE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Class$InfoRegisterUnregister
                                                                                                                    • String ID: @
                                                                                                                    • API String ID: 3749476976-2766056989
                                                                                                                    • Opcode ID: f63e7bba2927d9b20c5332474012c1eec1724a49959d6227c5091a8278f22a45
                                                                                                                    • Instruction ID: 0582e4decd83047b7d259989b1a1a5a7d11b83513a4c29c925389085b8c31041
                                                                                                                    • Opcode Fuzzy Hash: f63e7bba2927d9b20c5332474012c1eec1724a49959d6227c5091a8278f22a45
                                                                                                                    • Instruction Fuzzy Hash: 9E316F706042409BD720EF68C881B9B77E5AB85308F04457FF989DB396DB39D984CB6A
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000,00499238,00000000,004989DE,?,?,00000000,0049C628), ref: 00498958
                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00499238,00000000,004989DE,?,?,00000000,0049C628), ref: 00498981
                                                                                                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0049899A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Attributes$Move
                                                                                                                    • String ID: isRS-%.3u.tmp
                                                                                                                    • API String ID: 3839737484-3657609586
                                                                                                                    • Opcode ID: 481a7bc48378292d0d9514443bc536ceeed31eb1900f78afcde6c41445521250
                                                                                                                    • Instruction ID: b5053b6e7fa7181d8d55ffb0211e93ede9ed2a916a95833b3805d60610295bd2
                                                                                                                    • Opcode Fuzzy Hash: 481a7bc48378292d0d9514443bc536ceeed31eb1900f78afcde6c41445521250
                                                                                                                    • Instruction Fuzzy Hash: 1D2158B1D00159AFDF01DFA9C8819BFBBB8EB55314F11453FB414B72D1DA389E018A5A
                                                                                                                    APIs
                                                                                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                                                    • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExitMessageProcess
                                                                                                                    • String ID: Error$Runtime error at 00000000
                                                                                                                    • API String ID: 1220098344-2970929446
                                                                                                                    • Opcode ID: d2d2115462cf46c609d5747887fa32ed032da6f71deecf4a39b0bc855ac853b0
                                                                                                                    • Instruction ID: fb75bd3449ddbba25be9859e6e9cdae11be236df4b8f13ef698ff7f8a35764cd
                                                                                                                    • Opcode Fuzzy Hash: d2d2115462cf46c609d5747887fa32ed032da6f71deecf4a39b0bc855ac853b0
                                                                                                                    • Instruction Fuzzy Hash: 5E215360B44241CBEB11ABB5ACC17263B9197E5348F048177E740B73E2C67C9D5587AE
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042C814: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C838
                                                                                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                                    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456CF8
                                                                                                                    • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456D25
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                                                    • String ID: LoadTypeLib$RegisterTypeLib
                                                                                                                    • API String ID: 1312246647-2435364021
                                                                                                                    • Opcode ID: f0fa4eb5ebe45c922c3dc586aac30000597ac91e8294356b8a9e27c423337520
                                                                                                                    • Instruction ID: e26b8d5a5ba7491cefd4e72126217f2167f7f2a36d46249135fbb0ec9729d1e1
                                                                                                                    • Opcode Fuzzy Hash: f0fa4eb5ebe45c922c3dc586aac30000597ac91e8294356b8a9e27c423337520
                                                                                                                    • Instruction Fuzzy Hash: 55119670B00608BFDB11EFA6CD51A5EB7FDEB89705B518876F804D3652DA3C9D18CA24
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00457216
                                                                                                                    • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 004572B3
                                                                                                                    Strings
                                                                                                                    • Failed to create DebugClientWnd, xrefs: 0045727C
                                                                                                                    • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00457242
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend
                                                                                                                    • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                                                    • API String ID: 3850602802-3720027226
                                                                                                                    • Opcode ID: 9a46964b4fb996960123dd022ea41504470fc605069612a01803a2fa065a410b
                                                                                                                    • Instruction ID: b5c581551a88cbf950d7fc36a96106bfa88ed205bfa31746cca5d2dcd4d7a39c
                                                                                                                    • Opcode Fuzzy Hash: 9a46964b4fb996960123dd022ea41504470fc605069612a01803a2fa065a410b
                                                                                                                    • Instruction Fuzzy Hash: 4A1123706082406BE710AB699C81B4F7B989B59319F04447BF984DF383D7788849CBAE
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004242D4: SetWindowTextA.USER32(?,00000000), ref: 004242EC
                                                                                                                    • GetFocus.USER32 ref: 00478B93
                                                                                                                    • GetKeyState.USER32(0000007A), ref: 00478BA5
                                                                                                                    • WaitMessage.USER32(?,00000000,00478BCC,?,00000000,00478BF3,?,?,00000001,00000000,?,?,00480889,00000000,004817AB), ref: 00478BAF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FocusMessageStateTextWaitWindow
                                                                                                                    • String ID: Wnd=$%x
                                                                                                                    • API String ID: 1381870634-2927251529
                                                                                                                    • Opcode ID: 56ac62ba261c13ec75de75e3b0b9d956a03bf57f73efdd15721ffc7da14054af
                                                                                                                    • Instruction ID: dc81ccc12ba5f0d8980b62dc3576adf4111e854ad11f41bc8ce465a24b65dd47
                                                                                                                    • Opcode Fuzzy Hash: 56ac62ba261c13ec75de75e3b0b9d956a03bf57f73efdd15721ffc7da14054af
                                                                                                                    • Instruction Fuzzy Hash: 3711A370644249AFCB01EF65DC45A9E7BB8EB4D314B5184BEF408E7281DB7CAE00CA69
                                                                                                                    APIs
                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E810
                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E81F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Time$File$LocalSystem
                                                                                                                    • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                                                    • API String ID: 1748579591-1013271723
                                                                                                                    • Opcode ID: afc27b9defac450e26b0986b5fbe5a1bdb65cc68f7403b26db70cd1c163db108
                                                                                                                    • Instruction ID: 1109e0a0549d5184889796f6d95c1db6af1f7efe6b7ed272276b3322b0c95b1e
                                                                                                                    • Opcode Fuzzy Hash: afc27b9defac450e26b0986b5fbe5a1bdb65cc68f7403b26db70cd1c163db108
                                                                                                                    • Instruction Fuzzy Hash: 1111F5A440C3909ED340DF2AC44032FBAE4AB89704F44496EF9C8D7381E779C948DBA7
                                                                                                                    APIs
                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453FF7
                                                                                                                      • Part of subcall function 00406F60: DeleteFileA.KERNEL32(00000000,0049C628,00498DC9,00000000,00498E1E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F6B
                                                                                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 0045401C
                                                                                                                      • Part of subcall function 00453510: GetLastError.KERNEL32(00000000,004540A5,00000005,00000000,004540DA,?,?,00000000,0049C628,00000004,00000000,00000000,00000000,?,00498A7D,00000000), ref: 00453513
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$AttributesDeleteErrorLastMove
                                                                                                                    • String ID: DeleteFile$MoveFile
                                                                                                                    • API String ID: 3024442154-139070271
                                                                                                                    • Opcode ID: e6ecb1dbfe451e73ced23eeeb408c191c9d173acb1a016d6f6abe8d636493956
                                                                                                                    • Instruction ID: 5b319f4d86c429aaf34c497ec622aa84374fa007c64af5b461aa928f93ad298c
                                                                                                                    • Opcode Fuzzy Hash: e6ecb1dbfe451e73ced23eeeb408c191c9d173acb1a016d6f6abe8d636493956
                                                                                                                    • Instruction Fuzzy Hash: 42F036742041055BEB00FBB6D95266E67ECEB8470EF60443BF900BB6C3EA3D9E49492D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 004840E9
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0048410C
                                                                                                                    Strings
                                                                                                                    • System\CurrentControlSet\Control\Windows, xrefs: 004840B6
                                                                                                                    • CSDVersion, xrefs: 004840E0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                                                    • API String ID: 3677997916-1910633163
                                                                                                                    • Opcode ID: e6177dccfdccffb4b165993cffb6e954166e9eb20f95b4884a5f0f01978d4c96
                                                                                                                    • Instruction ID: 53b0cd76a008673903c9ef47d43ccdc3b5982ad8000f383f0d4d26435d6d51d8
                                                                                                                    • Opcode Fuzzy Hash: e6177dccfdccffb4b165993cffb6e954166e9eb20f95b4884a5f0f01978d4c96
                                                                                                                    • Instruction Fuzzy Hash: ABF03175E0020AAADF10EAD08C4DB9FB3BC9B54704F104567E910E7281E678AA848B59
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,00459549,00000000,00459701,?,00000000,00000000,00000000), ref: 00459459
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                                                    • API String ID: 47109696-2631785700
                                                                                                                    • Opcode ID: 8010f28983bc049789e2a41e09978bce303c8067828b4a2db98a6df8c10ff22e
                                                                                                                    • Instruction ID: da45e090e08c2af83dc97eff45d409e8c8a7a5d294f3c067393b5131bf5ff8bf
                                                                                                                    • Opcode Fuzzy Hash: 8010f28983bc049789e2a41e09978bce303c8067828b4a2db98a6df8c10ff22e
                                                                                                                    • Instruction Fuzzy Hash: F2F0AF31B04110ABC710AB1AD845B6E6398DBD235AF50803BF985DB253EA7CCC0B8769
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453BCE,00000000,00453C71,?,?,00000000,00000000,00000000,00000000,00000000,?,00454061,00000000), ref: 0042D91A
                                                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D920
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                                                    • API String ID: 1646373207-4063490227
                                                                                                                    • Opcode ID: 668015d286dac6ed483b16a742b0e62700dc4db53c3f9f7b812670d1427f7fe3
                                                                                                                    • Instruction ID: c73f6de4eb886e968b085a6e7c7cc63e3b6fdbea6d7e209729b619e098e19142
                                                                                                                    • Opcode Fuzzy Hash: 668015d286dac6ed483b16a742b0e62700dc4db53c3f9f7b812670d1427f7fe3
                                                                                                                    • Instruction Fuzzy Hash: F9E04FE1B40B5113E710667A5C8276B158E4B84728F90443B3994E52C7DDBCD9C8566D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAE0), ref: 0042EB72
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB78
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                                                    • API String ID: 1646373207-260599015
                                                                                                                    • Opcode ID: bee4edb2c449a5dfd1c01cdfe9b6f7374d179aa79d7f6a8ce8d951f478ed0695
                                                                                                                    • Instruction ID: d308361a71a1e4dc0c71eda52d15a5d5ca57c7b6b7e2bde91db1678b7815b427
                                                                                                                    • Opcode Fuzzy Hash: bee4edb2c449a5dfd1c01cdfe9b6f7374d179aa79d7f6a8ce8d951f478ed0695
                                                                                                                    • Instruction Fuzzy Hash: 8DD0A792301732626900F1F73CC1DBB0A8C89102793540077F601E1241D54DDC01156C
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,004992CA), ref: 0044F7F3
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F7F9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: NotifyWinEvent$user32.dll
                                                                                                                    • API String ID: 1646373207-597752486
                                                                                                                    • Opcode ID: c3786242a14ca03a62e3406b7bd0f53fb28c80e98e7c47f23881a3d4f16b908f
                                                                                                                    • Instruction ID: b1e2d04df43b1f620e0cf6c091983f233af54cc0e24e64f5668f936ad46d7efe
                                                                                                                    • Opcode Fuzzy Hash: c3786242a14ca03a62e3406b7bd0f53fb28c80e98e7c47f23881a3d4f16b908f
                                                                                                                    • Instruction Fuzzy Hash: 6BE012F0A417469EEB00BBF5998671A3AA0E75431CF51007BB1006A192CB7C44184F6E
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00499320,00000001,00000000,00499344), ref: 0049904A
                                                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00499050
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                                                    • API String ID: 1646373207-834958232
                                                                                                                    • Opcode ID: 646b07dbd550e4abdd546bdc612ddcefe778f12448e39103c2641131bf94b29c
                                                                                                                    • Instruction ID: 7509a849a1c86b60682be4b60143d7a07ed98817b3ed87241ead2d9b7982c41a
                                                                                                                    • Opcode Fuzzy Hash: 646b07dbd550e4abdd546bdc612ddcefe778f12448e39103c2641131bf94b29c
                                                                                                                    • Instruction Fuzzy Hash: 45B09280280611909C9032BB0D02A1B0E084881728718003F3560B01CACE6D8C04543E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0044B6CC: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F7E9,004992CA), ref: 0044B6F3
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B70B
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B71D
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B72F
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B741
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B753
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B765
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B777
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B789
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B79B
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B7AD
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B7BF
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B7D1
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B7E3
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B7F5
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B807
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B819
                                                                                                                      • Part of subcall function 0044B6CC: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B82B
                                                                                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,004992F2), ref: 004646AB
                                                                                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 004646B1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                                                    • API String ID: 2238633743-2683653824
                                                                                                                    • Opcode ID: f4442e2486f2b5e46a00971faa36ed1fd0fe9bdb0abc79278919a1fdde299c0b
                                                                                                                    • Instruction ID: 4b5030ed4f607149f6cd51c097547c25e56dbab9a2da70309a95c4064c32834c
                                                                                                                    • Opcode Fuzzy Hash: f4442e2486f2b5e46a00971faa36ed1fd0fe9bdb0abc79278919a1fdde299c0b
                                                                                                                    • Instruction Fuzzy Hash: A4B092E0A81641698D0077B2980790F289489A1B1CB14003F304076097EABC88100E5E
                                                                                                                    APIs
                                                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047DC74,?,?,?,?,00000000,0047DDC9,?,?,?,00000000,?,0047DED8), ref: 0047DC50
                                                                                                                    • FindClose.KERNEL32(000000FF,0047DC7B,0047DC74,?,?,?,?,00000000,0047DDC9,?,?,?,00000000,?,0047DED8,00000000), ref: 0047DC6E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$CloseFileNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2066263336-0
                                                                                                                    • Opcode ID: 626af9ae0c7025ae86db110923e2d8978f3bc9f77e1149f66e2b87a215601fbe
                                                                                                                    • Instruction ID: 1e82c9b5cfa583a005eddcd7dd146139acf465dd78b3df19642706576ae0a9c6
                                                                                                                    • Opcode Fuzzy Hash: 626af9ae0c7025ae86db110923e2d8978f3bc9f77e1149f66e2b87a215601fbe
                                                                                                                    • Instruction Fuzzy Hash: F7814D70D0424DAFCF21DFA5CC41ADFBBB9EF49304F1080AAE808A7291D6399A46CF54
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042EE90: GetTickCount.KERNEL32 ref: 0042EE96
                                                                                                                      • Part of subcall function 0042EC98: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECCD
                                                                                                                    • GetLastError.KERNEL32(00000000,00475B5D,?,?,0049D1E0,00000000), ref: 00475A46
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CountErrorFileLastMoveTick
                                                                                                                    • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                                                    • API String ID: 2406187244-2685451598
                                                                                                                    • Opcode ID: bdd100edfa0aef186b75102470bea3ad8c8c879f4a4d4cdb36382bc75decf58e
                                                                                                                    • Instruction ID: a9db3c141a3770340595dd3a0637540d48bb3c3777a437ddbd25d3dfc602479e
                                                                                                                    • Opcode Fuzzy Hash: bdd100edfa0aef186b75102470bea3ad8c8c879f4a4d4cdb36382bc75decf58e
                                                                                                                    • Instruction Fuzzy Hash: 85415871E006099FCB10EF65D882AEE77B4EF44314F508537E414BB351D778AA058BAD
                                                                                                                    APIs
                                                                                                                    • GetDesktopWindow.USER32 ref: 00413D56
                                                                                                                    • GetDesktopWindow.USER32 ref: 00413E0E
                                                                                                                      • Part of subcall function 00418ED0: 6F59C6F0.COMCTL32(?,00000000,00413FD3,00000000,004140E3,?,?,0049C628), ref: 00418EEC
                                                                                                                      • Part of subcall function 00418ED0: ShowCursor.USER32(00000001,?,00000000,00413FD3,00000000,004140E3,?,?,0049C628), ref: 00418F09
                                                                                                                    • SetCursor.USER32(00000000,?,?,?,?,00413B03,00000000,00413B16), ref: 00413E4C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CursorDesktopWindow$Show
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2074268717-0
                                                                                                                    • Opcode ID: c82077e875ceebfb446ca8bdba497cc44f2f016adda31143cf8d95e20cbb1c8e
                                                                                                                    • Instruction ID: a5e00dcc6fd9115ed5a77459d70fea990a5215d510f46849e0ce2877443e0a13
                                                                                                                    • Opcode Fuzzy Hash: c82077e875ceebfb446ca8bdba497cc44f2f016adda31143cf8d95e20cbb1c8e
                                                                                                                    • Instruction Fuzzy Hash: CA413771600260EFC714EF29E9C4B9677E1AB69325F16807BE404DB366DA38BD81CF58
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A85
                                                                                                                    • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AF4
                                                                                                                    • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B8F
                                                                                                                    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BCE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: LoadString$FileMessageModuleName
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 704749118-0
                                                                                                                    • Opcode ID: 2478aacc1cc0604c87cef9c23ce28a73e3b8baee1560f3a98c189eb7686d3011
                                                                                                                    • Instruction ID: c07fd310ac7ce6f4f6bdd3d287b746ce8d52192ab59c667046e5b60d4d48b312
                                                                                                                    • Opcode Fuzzy Hash: 2478aacc1cc0604c87cef9c23ce28a73e3b8baee1560f3a98c189eb7686d3011
                                                                                                                    • Instruction Fuzzy Hash: 0E3134716083849BD730EB65C945BDBB7E8AB85704F40483FB6C8DB2D1EB7859048B6B
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E981
                                                                                                                      • Part of subcall function 0044CFC4: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CFF6
                                                                                                                    • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044EA05
                                                                                                                      • Part of subcall function 0042BBC4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBD8
                                                                                                                    • IsRectEmpty.USER32(?), ref: 0044E9C7
                                                                                                                    • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E9EA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 855768636-0
                                                                                                                    • Opcode ID: be830068c3edf1c95023cfeceac366b6905f068659723eff49c6974a0b69c569
                                                                                                                    • Instruction ID: 77b7b7799a66ce86f667cf0b036ff1ab111c9581c09ca9d8f795578908ad38d2
                                                                                                                    • Opcode Fuzzy Hash: be830068c3edf1c95023cfeceac366b6905f068659723eff49c6974a0b69c569
                                                                                                                    • Instruction Fuzzy Hash: 36118C72B0034027E610BA3E8C86B5B66C99B88708F14083FB605EB3C7DE7CDC094399
                                                                                                                    APIs
                                                                                                                    • OffsetRect.USER32(?,?,00000000), ref: 00496060
                                                                                                                    • OffsetRect.USER32(?,00000000,?), ref: 0049607B
                                                                                                                    • OffsetRect.USER32(?,?,00000000), ref: 00496095
                                                                                                                    • OffsetRect.USER32(?,00000000,?), ref: 004960B0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: OffsetRect
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 177026234-0
                                                                                                                    • Opcode ID: a5b10c5c05c4c4c8690ebf0e0d14455fb01428b86b9d3b295170541a370ec2ec
                                                                                                                    • Instruction ID: 8eac29a9a723dba05d0f501e7f7c311a2f3b3ed3193ada35ebb1b3014bd25ec0
                                                                                                                    • Opcode Fuzzy Hash: a5b10c5c05c4c4c8690ebf0e0d14455fb01428b86b9d3b295170541a370ec2ec
                                                                                                                    • Instruction Fuzzy Hash: F6215EB6700201ABCB00DE69CDC5E6BB7EEEBD4344F15CA2AF548C7389D634E9448796
                                                                                                                    APIs
                                                                                                                    • GetCursorPos.USER32 ref: 00417270
                                                                                                                    • SetCursor.USER32(00000000), ref: 004172B3
                                                                                                                    • GetLastActivePopup.USER32(?), ref: 004172DD
                                                                                                                    • GetForegroundWindow.USER32(?), ref: 004172E4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1959210111-0
                                                                                                                    • Opcode ID: e1b8292847e1495943439bfb526301e98f20bb6a1a323b8f65a3f0d30a7d056b
                                                                                                                    • Instruction ID: a3ca0b5fbe6c86dc8433d056dfe209cecf977414c0e936569190c1b416abce34
                                                                                                                    • Opcode Fuzzy Hash: e1b8292847e1495943439bfb526301e98f20bb6a1a323b8f65a3f0d30a7d056b
                                                                                                                    • Instruction Fuzzy Hash: 7F2180713086018BC720AF69D885ADB73B1AB48764B4545ABF855CB352D73DDC82CB49
                                                                                                                    APIs
                                                                                                                    • MulDiv.KERNEL32(8B500000,00000008,?), ref: 00495CC9
                                                                                                                    • MulDiv.KERNEL32(50142444,00000008,?), ref: 00495CDD
                                                                                                                    • MulDiv.KERNEL32(F6F86FE8,00000008,?), ref: 00495CF1
                                                                                                                    • MulDiv.KERNEL32(8BF88BFF,00000008,?), ref: 00495D0F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                                                    • Instruction ID: f271e463c2a04687a7cd3b1fed15c38c3ae6b45cd4ce19c79766351c2a45cab8
                                                                                                                    • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                                                    • Instruction Fuzzy Hash: 78112172604604AFCB40EFA9C8C4D9B7BECEF4D320B24416AFD19DB246D634ED408BA4
                                                                                                                    APIs
                                                                                                                    • GetClassInfoA.USER32(00400000,0041F480,?), ref: 0041F4B1
                                                                                                                    • UnregisterClassA.USER32(0041F480,00400000), ref: 0041F4DA
                                                                                                                    • RegisterClassA.USER32(0049A598), ref: 0041F4E4
                                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F51F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4025006896-0
                                                                                                                    • Opcode ID: 46111e49518ace76b25441b5b8420e7e5a88ee32249e97549851b52d686e3228
                                                                                                                    • Instruction ID: bc278c4f6faf11cefbb7876bdabff60d814ef9460a0beef0b041e337848a6ca8
                                                                                                                    • Opcode Fuzzy Hash: 46111e49518ace76b25441b5b8420e7e5a88ee32249e97549851b52d686e3228
                                                                                                                    • Instruction Fuzzy Hash: BB014071300104BBCB10EBA9ED81E9B779C9719314F51423BB505E72E2D6399C158BBD
                                                                                                                    APIs
                                                                                                                    • WaitForInputIdle.USER32(00000001,00000032), ref: 0045501C
                                                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 0045503E
                                                                                                                    • GetExitCodeProcess.KERNEL32(00000001,00000001), ref: 0045504D
                                                                                                                    • CloseHandle.KERNEL32(00000001,0045507A,00455073,?,00000031,00000080,00000000,?,?,004553D3,00000080,0000003C,00000000,004553E9), ref: 0045506D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4071923889-0
                                                                                                                    • Opcode ID: aaa38026e2161bc5d10e27088da429faa58cfaab67b23fe3f60cb52595d37df2
                                                                                                                    • Instruction ID: d12116b756cd226a9453b7b7c95f557e71215baafd626de0b651f5c3ff172158
                                                                                                                    • Opcode Fuzzy Hash: aaa38026e2161bc5d10e27088da429faa58cfaab67b23fe3f60cb52595d37df2
                                                                                                                    • Instruction Fuzzy Hash: F801F570A00A08BEEB209BA9CC12F7F7BACDF45B60F600167B904D32C2C5789D0486B8
                                                                                                                    APIs
                                                                                                                    • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D037
                                                                                                                    • LoadResource.KERNEL32(00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?,?,0047CFDC,0000000A,00000000), ref: 0040D051
                                                                                                                    • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?,?,0047CFDC), ref: 0040D06B
                                                                                                                    • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7D8,00400000,00000001,00000000,?,0040CF94,00000000,?,00000000,?), ref: 0040D075
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3473537107-0
                                                                                                                    • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                                                    • Instruction ID: 36a118f2821a5a72c918f59cdb85223c1d13502428e6f53becfecf356bbc3684
                                                                                                                    • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                                                    • Instruction Fuzzy Hash: ECF062B36055046F9B04EFADA881D5B77DCDE88364310017FF908E7282DA39DD118B78
                                                                                                                    APIs
                                                                                                                    • RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                                    • RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                                    • RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 730355536-0
                                                                                                                    • Opcode ID: a537f80313018cf3950957164b1fdd12897bf3377eacdc83d36d2ef3f56c3ae2
                                                                                                                    • Instruction ID: 68a963c4b4ce3cb9fa4489d147f84cdc209e61955976dc0c42ca8291dd14a8a4
                                                                                                                    • Opcode Fuzzy Hash: a537f80313018cf3950957164b1fdd12897bf3377eacdc83d36d2ef3f56c3ae2
                                                                                                                    • Instruction Fuzzy Hash: 1501C0707842405EFB19AB6998A27353ED4D796748F91803BF440A6AF1C67C4840CB6D
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 004707E9
                                                                                                                    Strings
                                                                                                                    • Failed to set NTFS compression state (%d)., xrefs: 004707FA
                                                                                                                    • Setting NTFS compression on file: %s, xrefs: 004707B7
                                                                                                                    • Unsetting NTFS compression on file: %s, xrefs: 004707CF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                                                    • API String ID: 1452528299-3038984924
                                                                                                                    • Opcode ID: 0da083cedf78d204021f0c22f46e9404a6a0d1fca2abd04a8242647f3c87b887
                                                                                                                    • Instruction ID: 145c5581ad0eca4b083c726d4b350626947fd7e4083fb75601c5580ae1b156b2
                                                                                                                    • Opcode Fuzzy Hash: 0da083cedf78d204021f0c22f46e9404a6a0d1fca2abd04a8242647f3c87b887
                                                                                                                    • Instruction Fuzzy Hash: 38016C31D0D148A9CB04D7ED60416DDBFA89F09304F45C5EFA459D7282D7B915088BDA
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B856,?,?,?,?,?,00000000,0045B87D), ref: 00455E80
                                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B856,?,?,?,?,?,00000000), ref: 00455E89
                                                                                                                    • RemoveFontResourceA.GDI32(00000000), ref: 00455E96
                                                                                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455EAA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4283692357-0
                                                                                                                    • Opcode ID: 0cea296a99f6bc8f54668b4dbe0ebeaba86c29914302827ce1a00d79840e3846
                                                                                                                    • Instruction ID: 2b3bc76bcbe24f9a378c9fd2a9d0a5bd871778c5a23a50a9ca37bd21dd0b5b9e
                                                                                                                    • Opcode Fuzzy Hash: 0cea296a99f6bc8f54668b4dbe0ebeaba86c29914302827ce1a00d79840e3846
                                                                                                                    • Instruction Fuzzy Hash: C2F030B574470176EA10B7B69C47F1B228C8B54745F14483ABA00EB2C3D97CD904966D
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000), ref: 0047003D
                                                                                                                    Strings
                                                                                                                    • Setting NTFS compression on directory: %s, xrefs: 0047000B
                                                                                                                    • Unsetting NTFS compression on directory: %s, xrefs: 00470023
                                                                                                                    • Failed to set NTFS compression state (%d)., xrefs: 0047004E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast
                                                                                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                                                    • API String ID: 1452528299-1392080489
                                                                                                                    • Opcode ID: 501c20c4b4589d314784abe810e87fd7af79d86b38d8ef254cb346fbb93d82bb
                                                                                                                    • Instruction ID: 604d54a06cc176a09f793a0f1904e0e91a55842988fe096117b9dad4a0540a88
                                                                                                                    • Opcode Fuzzy Hash: 501c20c4b4589d314784abe810e87fd7af79d86b38d8ef254cb346fbb93d82bb
                                                                                                                    • Instruction Fuzzy Hash: 96011731D0D288A6CB04D7AD70417DDBFB49F49314F44C1EFA459E7282DB790909879A
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$CountSleepTick
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2227064392-0
                                                                                                                    • Opcode ID: 9d8c620ac145a49ef357bc67e7af840132a63e2ed6bee5855d7efcfcc9ec2cde
                                                                                                                    • Instruction ID: ce153dc38a8bb7651996ca8f0dac3f9c26bc2c6ac7669c34f37b685d31f90408
                                                                                                                    • Opcode Fuzzy Hash: 9d8c620ac145a49ef357bc67e7af840132a63e2ed6bee5855d7efcfcc9ec2cde
                                                                                                                    • Instruction Fuzzy Hash: D1E0E562B59140658A2431FE18C25BF85A8CECA364B18867FE4C9D6243CC5D8C0786BF
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(00000008,?,?,00000001,00000000,00000002,00000000,004817AB,?,?,?,?,?,004993B3,00000000,004993DB), ref: 00478649
                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB,?,?,?,?,?,004993B3,00000000), ref: 0047864F
                                                                                                                    • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 00478671
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,00000001,00000000,00000002,00000000,004817AB), ref: 00478682
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 215268677-0
                                                                                                                    • Opcode ID: 897cebff796fb9acf24ada6806b428e4bae0fdb6bab1f730a63c16ba700ca759
                                                                                                                    • Instruction ID: 838b6a51ddc7838befbc46fdc110c266dd1fb76be3e125ebbed13216a87d498a
                                                                                                                    • Opcode Fuzzy Hash: 897cebff796fb9acf24ada6806b428e4bae0fdb6bab1f730a63c16ba700ca759
                                                                                                                    • Instruction Fuzzy Hash: 8CF01CB16443007BD600EAA58C82A9B72DCEB44754F04883E7A98CB2D1DA79D808AB66
                                                                                                                    APIs
                                                                                                                    • GetLastActivePopup.USER32(?), ref: 0042425C
                                                                                                                    • IsWindowVisible.USER32(?), ref: 0042426D
                                                                                                                    • IsWindowEnabled.USER32(?), ref: 00424277
                                                                                                                    • SetForegroundWindow.USER32(?), ref: 00424281
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2280970139-0
                                                                                                                    • Opcode ID: 0c1e0aa051013007664b3f07c8d487170f49f724953434a4891b7e2a8b6b14ea
                                                                                                                    • Instruction ID: 2755c926dfb62d6ecb2d5c8fb2e1e882bb3f56b09ddc897a1aa573e645a4fcd2
                                                                                                                    • Opcode Fuzzy Hash: 0c1e0aa051013007664b3f07c8d487170f49f724953434a4891b7e2a8b6b14ea
                                                                                                                    • Instruction Fuzzy Hash: 99E0EC61B0257196AAB1EA7B2881A9F118CDD46BE434602A7FD41F7287DB2CDC1045BD
                                                                                                                    APIs
                                                                                                                    • GlobalHandle.KERNEL32 ref: 0040627F
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00406286
                                                                                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040628B
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00406291
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Global$AllocHandleLockUnlock
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2167344118-0
                                                                                                                    • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                                                    • Instruction ID: 024a49765fc045a09389489d8ed5919b86daafa6bea6a005e9f609907830066e
                                                                                                                    • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                                                    • Instruction Fuzzy Hash: 64B009C6925A46B8EC0473B24C4BD3F041CE88472C3809A6E7554BA0839C7C9C002E3A
                                                                                                                    APIs
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BF85,?,00000000,00000000,00000001,00000000,0047A939,?,00000000), ref: 0047A8FD
                                                                                                                    Strings
                                                                                                                    • Failed to parse "reg" constant, xrefs: 0047A904
                                                                                                                    • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A771
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Close
                                                                                                                    • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                                                    • API String ID: 3535843008-1938159461
                                                                                                                    • Opcode ID: 77d15435ed7941471254957dc5e0bf6c56fac4dd4ccf85e4ea98b545af4b6f3b
                                                                                                                    • Instruction ID: ad7b2ad32a4e046eb061743552de15717f644d650d615c3b0b0b82a4ca8416c6
                                                                                                                    • Opcode Fuzzy Hash: 77d15435ed7941471254957dc5e0bf6c56fac4dd4ccf85e4ea98b545af4b6f3b
                                                                                                                    • Instruction Fuzzy Hash: D78182B4E00148AFCB11EF95C481ADEBBF9AF88344F10856AE814B7391D738DE15CB99
                                                                                                                    APIs
                                                                                                                    • GetForegroundWindow.USER32(00000000,00483BFA,?,00000000,00483C3B,?,?,?,?,00000000,00000000,00000000,?,0046BE99), ref: 00483AA9
                                                                                                                    • SetActiveWindow.USER32(?,00000000,00483BFA,?,00000000,00483C3B,?,?,?,?,00000000,00000000,00000000,?,0046BE99), ref: 00483ABB
                                                                                                                    Strings
                                                                                                                    • Will not restart Windows automatically., xrefs: 00483BDA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ActiveForeground
                                                                                                                    • String ID: Will not restart Windows automatically.
                                                                                                                    • API String ID: 307657957-4169339592
                                                                                                                    • Opcode ID: fd112b4c8de44069fed4ab784b6429e18bede020499d5fe5eba8df49eb47ae3b
                                                                                                                    • Instruction ID: 00c250453c0a17a9e15f8b7c17bf5d610a6a62ae57f998986b3a61a72a87f8d4
                                                                                                                    • Opcode Fuzzy Hash: fd112b4c8de44069fed4ab784b6429e18bede020499d5fe5eba8df49eb47ae3b
                                                                                                                    • Instruction Fuzzy Hash: 79411270A04280AEDB11FF25DC56BAD7BE4AB14B09F140C7BE8405B3A3C27D7A45971E
                                                                                                                    APIs
                                                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,0047691B,?,00000000,0047692C,?,00000000,00476975), ref: 004768EC
                                                                                                                    • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,0047691B,?,00000000,0047692C,?,00000000,00476975), ref: 00476900
                                                                                                                    Strings
                                                                                                                    • Extracting temporary file: , xrefs: 00476828
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileTime$Local
                                                                                                                    • String ID: Extracting temporary file:
                                                                                                                    • API String ID: 791338737-4171118009
                                                                                                                    • Opcode ID: 8bb9d3133b1fb9ec8af2f49f23ff7fadb73ae79880f698f59a04eeed571ff557
                                                                                                                    • Instruction ID: d70a0822c1878ba5cc3cea7231243a1bdea1af23cb32f526b41bd2dcbb3c8472
                                                                                                                    • Opcode Fuzzy Hash: 8bb9d3133b1fb9ec8af2f49f23ff7fadb73ae79880f698f59a04eeed571ff557
                                                                                                                    • Instruction Fuzzy Hash: 5D41CB70E00649AFCB01EFA5C891ADFBBB9EF09304F51847AF914A7391D7789905CB54
                                                                                                                    Strings
                                                                                                                    • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CE38
                                                                                                                    • Failed to proceed to next wizard page; aborting., xrefs: 0046CE24
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                                                    • API String ID: 0-1974262853
                                                                                                                    • Opcode ID: bd600112513020f620d7d4569e21eaae9941e9eb8c4aa750224beaba235140ee
                                                                                                                    • Instruction ID: b126ef70070b574b462b5ad6e8f6b62ab94db58f07a08aa979416f05a1434e77
                                                                                                                    • Opcode Fuzzy Hash: bd600112513020f620d7d4569e21eaae9941e9eb8c4aa750224beaba235140ee
                                                                                                                    • Instruction Fuzzy Hash: 5931A2306042009FD711EB59D989BA97BF9AB05304F6500BBF448AB3A2D778AE44DB59
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0042DE2C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,004840C7,?,00000001,?,?,004840C7,?,00000001,00000000), ref: 0042DE48
                                                                                                                    • RegCloseKey.ADVAPI32(?,004793BA,?,?,00000001,00000000,00000000,004793D5), ref: 004793A3
                                                                                                                    Strings
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0047932E
                                                                                                                    • %s\%s_is1, xrefs: 0047934C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen
                                                                                                                    • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                                                    • API String ID: 47109696-1598650737
                                                                                                                    • Opcode ID: 5876521af63fea2d723ac8766087b83774f6a033c2a54a4781096f04c37f5e18
                                                                                                                    • Instruction ID: 81948899c858854939f702104da2ecae25413b277659753d1c8da10ae03f2604
                                                                                                                    • Opcode Fuzzy Hash: 5876521af63fea2d723ac8766087b83774f6a033c2a54a4781096f04c37f5e18
                                                                                                                    • Instruction Fuzzy Hash: 7E216174A046446FDB11DFA9CC51AAEBBF8EB4D704F90847AE808E7381D7789D018B99
                                                                                                                    APIs
                                                                                                                    • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 00450271
                                                                                                                    • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004502A2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExecuteMessageSendShell
                                                                                                                    • String ID: open
                                                                                                                    • API String ID: 812272486-2758837156
                                                                                                                    • Opcode ID: 1d47999e67842d91bbdff3080109e9f99b92e08493ad044d5529b9a4f90a2308
                                                                                                                    • Instruction ID: 579e8a969fc791085b17213fdcb8cb543336c6f56b5ff41e9c914d75dd94f84d
                                                                                                                    • Opcode Fuzzy Hash: 1d47999e67842d91bbdff3080109e9f99b92e08493ad044d5529b9a4f90a2308
                                                                                                                    • Instruction Fuzzy Hash: 9D215174A00204AFDB04DFA5CC85B9EB7F9EB44705F2085BAB404E7292DB789E45CA48
                                                                                                                    APIs
                                                                                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 004553A0
                                                                                                                    • GetLastError.KERNEL32(0000003C,00000000,004553E9,?,?,00000001,00000001), ref: 004553B1
                                                                                                                      • Part of subcall function 0042D8D4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8E7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                                                    • String ID: <
                                                                                                                    • API String ID: 893404051-4251816714
                                                                                                                    • Opcode ID: 9dcb97b8db9b1a097733590404b925c857cc427e9a0041e14877970af2232f4e
                                                                                                                    • Instruction ID: 1baeac92009e3f48d7e72975e94fd539b808c95e86e95f0c8891d74cc8928d66
                                                                                                                    • Opcode Fuzzy Hash: 9dcb97b8db9b1a097733590404b925c857cc427e9a0041e14877970af2232f4e
                                                                                                                    • Instruction Fuzzy Hash: 51213570A04649AFDB10DF65D8926AE7BF8AF08355F90403BFC44E7381D7789E498B98
                                                                                                                    APIs
                                                                                                                    • RtlEnterCriticalSection.KERNEL32(0049C420,00000000,)), ref: 004025C7
                                                                                                                    • RtlLeaveCriticalSection.KERNEL32(0049C420,0040263D), ref: 00402630
                                                                                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049C420,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049C420,0049C420,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049C420,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049C420,00401A89,00000000,00401A82,?,?,0040222E,022F76F0,00001080,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                                                    • String ID: )
                                                                                                                    • API String ID: 2227675388-1084416617
                                                                                                                    • Opcode ID: 396a9afb75b2cc7f7a4cbe0e3edaa9b49a36ea60243cfc7b43fdf6a3ec3db581
                                                                                                                    • Instruction ID: 1fa17fb08616f6b4eef2bbe9ac14d29337f111a30cd6b0cffb698505e2c33406
                                                                                                                    • Opcode Fuzzy Hash: 396a9afb75b2cc7f7a4cbe0e3edaa9b49a36ea60243cfc7b43fdf6a3ec3db581
                                                                                                                    • Instruction Fuzzy Hash: A21134307042006FEB10AB795F6A62A6AD4D795358B60087FF404F32D2D9BD8C02825C
                                                                                                                    APIs
                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00497241
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window
                                                                                                                    • String ID: /INITPROCWND=$%x $@
                                                                                                                    • API String ID: 2353593579-4169826103
                                                                                                                    • Opcode ID: 5a103d45b4538b44b7d3fd145df9eaa2b16f7591657a5688a99aa9ff68a700bd
                                                                                                                    • Instruction ID: 05f588258c78c5b50029c9c11ed11213d1445aaa1ba567bca7741b432d444d98
                                                                                                                    • Opcode Fuzzy Hash: 5a103d45b4538b44b7d3fd145df9eaa2b16f7591657a5688a99aa9ff68a700bd
                                                                                                                    • Instruction Fuzzy Hash: A611A571A282089FDB01DBA5D851FAEBBE8EB48314F5084BBF904E7291D63C9905CB5C
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 0044753A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: String$AllocByteCharFreeMultiWide
                                                                                                                    • String ID: NIL Interface Exception$Unknown Method
                                                                                                                    • API String ID: 3952431833-1023667238
                                                                                                                    • Opcode ID: b5b3b2027cd9392a30aef52b357f29023a93b6cb0369269594e46825eb3d0212
                                                                                                                    • Instruction ID: e21740dd19ee0d3aaa7bf219fd9fa850e2e2e771d5dc584e192d83827b059975
                                                                                                                    • Opcode Fuzzy Hash: b5b3b2027cd9392a30aef52b357f29023a93b6cb0369269594e46825eb3d0212
                                                                                                                    • Instruction Fuzzy Hash: 9211E930A04204AFEB00DFA59D42A6EBBBCEB49704F51447AF500EB681DB789D00CB69
                                                                                                                    APIs
                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496B40,?,00496B34,00000000,00496B1B), ref: 00496AE6
                                                                                                                    • CloseHandle.KERNEL32(00496B80,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496B40,?,00496B34,00000000), ref: 00496AFD
                                                                                                                      • Part of subcall function 004969D0: GetLastError.KERNEL32(00000000,00496A68,?,?,?,?), ref: 004969F4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateErrorHandleLastProcess
                                                                                                                    • String ID: D
                                                                                                                    • API String ID: 3798668922-2746444292
                                                                                                                    • Opcode ID: 8c076d8b975d6b314500e760c1b31ec559303ffe873c3baf39058a33e9a74c9f
                                                                                                                    • Instruction ID: 4578fedeb831857a9fa7b324a6e48fa42854d3e5b1879a7f0481b0c617fb48be
                                                                                                                    • Opcode Fuzzy Hash: 8c076d8b975d6b314500e760c1b31ec559303ffe873c3baf39058a33e9a74c9f
                                                                                                                    • Instruction Fuzzy Hash: 050165B1644148AFDF00DBD6CC92F9F7BACDF49714F52407BB504E7281E6789E058619
                                                                                                                    APIs
                                                                                                                    • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD88
                                                                                                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDC8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Value$EnumQuery
                                                                                                                    • String ID: Inno Setup: No Icons
                                                                                                                    • API String ID: 1576479698-2016326496
                                                                                                                    • Opcode ID: 8eee03c1fbfc328194d38fab97817ecd3167584576368d321fe403edd0428e5d
                                                                                                                    • Instruction ID: 8a75d463627faac0db3bfd1327658b2d26d196a72fd2cd26e512c66f67a8876f
                                                                                                                    • Opcode Fuzzy Hash: 8eee03c1fbfc328194d38fab97817ecd3167584576368d321fe403edd0428e5d
                                                                                                                    • Instruction Fuzzy Hash: E0012B36F5A77079F73046216D02BBB56888B82B60F68053BF940EA2C0D6589C04D36E
                                                                                                                    APIs
                                                                                                                    • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452F5D,?,?,-00000001,?), ref: 00452F37
                                                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,00452F5D,?,?,-00000001,?), ref: 00452F3F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesErrorFileLast
                                                                                                                    • String ID: 8)H
                                                                                                                    • API String ID: 1799206407-3916970867
                                                                                                                    • Opcode ID: ce74d8d9d820f7af3c63aa287241caff3d4e0ddf2f4ddb2ef23d86c57fabe815
                                                                                                                    • Instruction ID: dde47f3407bff09e6a38a0e499abe30f06c7602c99efaa7623f496abef129164
                                                                                                                    • Opcode Fuzzy Hash: ce74d8d9d820f7af3c63aa287241caff3d4e0ddf2f4ddb2ef23d86c57fabe815
                                                                                                                    • Instruction Fuzzy Hash: DAF0F972A04204BBCB00DB76AD4149EF7FCDB4A721710457BFC04D3342E6B85E089598
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0045568C: GetCurrentProcess.KERNEL32(00000028), ref: 0045569B
                                                                                                                      • Part of subcall function 0045568C: OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004556A1
                                                                                                                    • SetForegroundWindow.USER32(?), ref: 00497F6E
                                                                                                                    Strings
                                                                                                                    • Not restarting Windows because Uninstall is being run from the debugger., xrefs: 00497F99
                                                                                                                    • Restarting Windows., xrefs: 00497F4B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CurrentForegroundOpenTokenWindow
                                                                                                                    • String ID: Not restarting Windows because Uninstall is being run from the debugger.$Restarting Windows.
                                                                                                                    • API String ID: 3179053593-4147564754
                                                                                                                    • Opcode ID: a5cc7a903ad3542029bb0d77cfbe7a364602ca208a9d9cbdfb1bf1aa9e376992
                                                                                                                    • Instruction ID: 4b66e7a5e74ecb784a5d921af265fbc31bf072fcbe68812fd41d72e60711739e
                                                                                                                    • Opcode Fuzzy Hash: a5cc7a903ad3542029bb0d77cfbe7a364602ca208a9d9cbdfb1bf1aa9e376992
                                                                                                                    • Instruction Fuzzy Hash: 1C0188706182409BEB05E765E441B9D3FD99F95309F50807BF404772D3C67D9D49872D
                                                                                                                    APIs
                                                                                                                    • DeleteFileA.KERNEL32(00000000,00000000,004529D9,?,-00000001,?), ref: 004529B3
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,004529D9,?,-00000001,?), ref: 004529BB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteErrorFileLast
                                                                                                                    • String ID: 8)H
                                                                                                                    • API String ID: 2018770650-3916970867
                                                                                                                    • Opcode ID: 2bffeee8909a74cd18c2d876bd05f5b8a9f89f7c78f30e1aeb97f13d0a4fc114
                                                                                                                    • Instruction ID: 616889b774c7d0a889357a9a25b6211c9f917d25ccf9d7241b8d0611c73475d1
                                                                                                                    • Opcode Fuzzy Hash: 2bffeee8909a74cd18c2d876bd05f5b8a9f89f7c78f30e1aeb97f13d0a4fc114
                                                                                                                    • Instruction Fuzzy Hash: 6CF0C8B1B04708ABDB00EF759D4249EB7ECDB4A315B5045B7FC04E3742E6785E148598
                                                                                                                    APIs
                                                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00452EE1,?,-00000001,00000000), ref: 00452EBB
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,00452EE1,?,-00000001,00000000), ref: 00452EC3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DirectoryErrorLastRemove
                                                                                                                    • String ID: 8)H
                                                                                                                    • API String ID: 377330604-3916970867
                                                                                                                    • Opcode ID: 13593e553e6be281e96d7bb953d56a5927f6c498d227b46fc847c2a148732c0c
                                                                                                                    • Instruction ID: c7bdba2715fb66454707c14724f72c320a39a9c6e4158119f2851cf94b52ae50
                                                                                                                    • Opcode Fuzzy Hash: 13593e553e6be281e96d7bb953d56a5927f6c498d227b46fc847c2a148732c0c
                                                                                                                    • Instruction Fuzzy Hash: F2F0C871A04708ABCB00DFB59D4249EB7E8EB4E31575049B7FC04E7642E7785E049558
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0047D550: FreeLibrary.KERNEL32(73AF0000,00481F13), ref: 0047D566
                                                                                                                      • Part of subcall function 0047D220: GetTickCount.KERNEL32 ref: 0047D26A
                                                                                                                      • Part of subcall function 0045733C: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 0045735B
                                                                                                                    • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00499033), ref: 00498731
                                                                                                                    • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00499033), ref: 00498737
                                                                                                                    Strings
                                                                                                                    • Detected restart. Removing temporary directory., xrefs: 004986EB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                                                    • String ID: Detected restart. Removing temporary directory.
                                                                                                                    • API String ID: 1717587489-3199836293
                                                                                                                    • Opcode ID: dacc005acb48f2c9a6c17312f31363653640754999933287209c5bc8a26dcf54
                                                                                                                    • Instruction ID: 1f2dec6c19a68f67b40637f6c2d8dd05bc5c387ef6d5d21522d9e9d16f9083c3
                                                                                                                    • Opcode Fuzzy Hash: dacc005acb48f2c9a6c17312f31363653640754999933287209c5bc8a26dcf54
                                                                                                                    • Instruction Fuzzy Hash: 91E0A0716086402ADA0277AA7C1296B3B5CDB46768B6144BFF80491A52E92C4811C67D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,0049928E), ref: 0040334B
                                                                                                                    • GetCommandLineA.KERNEL32(00000000,0049928E), ref: 00403356
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CommandHandleLineModule
                                                                                                                    • String ID: p7o
                                                                                                                    • API String ID: 2123368496-3870977471
                                                                                                                    • Opcode ID: f58f8e950532dcfe9cce0c082a6550bb3b71f662624f5e87828fb25057d706ed
                                                                                                                    • Instruction ID: 9846383379d11da5b3979ec5ca3a4cf6b38316955b58c391e9082901a5cd845e
                                                                                                                    • Opcode Fuzzy Hash: f58f8e950532dcfe9cce0c082a6550bb3b71f662624f5e87828fb25057d706ed
                                                                                                                    • Instruction Fuzzy Hash: 98C00260901205CBE750AFF6A886B156A94A751389F8044BFB104BA2E2DA7C82056BEE
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000001.00000002.2949665371.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000001.00000002.2949642508.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949725620.000000000049A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949742777.000000000049B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949760723.000000000049C000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    • Associated: 00000001.00000002.2949777292.00000000004AC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_1_2_400000_SecuriteInfo.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastSleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1458359878-0
                                                                                                                    • Opcode ID: 648dda9fcfa3be0796cf1e21ca424cd02d6c478e8aba2200b071bc3282ec43fd
                                                                                                                    • Instruction ID: c9025c94a886fb5f76285139ad04fc7cdabfdd445e85fa9ce07bcd72d8186167
                                                                                                                    • Opcode Fuzzy Hash: 648dda9fcfa3be0796cf1e21ca424cd02d6c478e8aba2200b071bc3282ec43fd
                                                                                                                    • Instruction Fuzzy Hash: 0FF0B472B00914E74F20A5AAA99197F678CEA9D376F10852BFC04D7307C53DDD098AED

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:11.3%
                                                                                                                    Dynamic/Decrypted Code Coverage:82.9%
                                                                                                                    Signature Coverage:4.4%
                                                                                                                    Total number of Nodes:2000
                                                                                                                    Total number of Limit Nodes:40
                                                                                                                    execution_graph 17722 402d60 GetVersion 17746 4039f0 HeapCreate 17722->17746 17724 402dbf 17725 402dc4 17724->17725 17726 402dcc 17724->17726 17821 402e7b 17725->17821 17758 4036d0 17726->17758 17730 402dd4 GetCommandLineA 17772 40359e 17730->17772 17734 402dee 17804 403298 17734->17804 17736 402df3 17737 402df8 GetStartupInfoA 17736->17737 17817 403240 17737->17817 17739 402e0a GetModuleHandleA 17741 402e2e 17739->17741 17827 402fe7 17741->17827 17747 403a10 17746->17747 17748 403a46 17746->17748 17834 4038a8 17747->17834 17748->17724 17751 403a2c 17754 403a49 17751->17754 17848 404618 17751->17848 17752 403a1f 17846 403dc7 HeapAlloc 17752->17846 17754->17724 17755 403a29 17755->17754 17757 403a3a HeapDestroy 17755->17757 17757->17748 17911 402e9f 17758->17911 17761 4036ef GetStartupInfoA 17764 403800 17761->17764 17765 40373b 17761->17765 17766 403867 SetHandleCount 17764->17766 17767 403827 GetStdHandle 17764->17767 17765->17764 17768 4037ac 17765->17768 17769 402e9f 12 API calls 17765->17769 17766->17730 17767->17764 17770 403835 GetFileType 17767->17770 17768->17764 17771 4037ce GetFileType 17768->17771 17769->17765 17770->17764 17771->17768 17773 4035b9 GetEnvironmentStringsW 17772->17773 17774 4035ec 17772->17774 17775 4035c1 17773->17775 17776 4035cd GetEnvironmentStrings 17773->17776 17774->17775 17777 4035dd 17774->17777 17779 403605 WideCharToMultiByte 17775->17779 17780 4035f9 GetEnvironmentStringsW 17775->17780 17776->17777 17778 402de4 17776->17778 17777->17778 17781 40368b 17777->17781 17782 40367f GetEnvironmentStrings 17777->17782 17795 403351 17778->17795 17784 403639 17779->17784 17785 40366b FreeEnvironmentStringsW 17779->17785 17780->17778 17780->17779 17786 402e9f 12 API calls 17781->17786 17782->17778 17782->17781 17787 402e9f 12 API calls 17784->17787 17785->17778 17789 4036a6 17786->17789 17788 40363f 17787->17788 17788->17785 17790 403648 WideCharToMultiByte 17788->17790 17791 4036bc FreeEnvironmentStringsA 17789->17791 17792 403662 17790->17792 17793 403659 17790->17793 17791->17778 17792->17785 17977 402f51 17793->17977 17796 403363 17795->17796 17797 403368 GetModuleFileNameA 17795->17797 18007 405042 17796->18007 17799 40338b 17797->17799 17800 402e9f 12 API calls 17799->17800 17801 4033ac 17800->17801 17802 402e56 7 API calls 17801->17802 17803 4033bc 17801->17803 17802->17803 17803->17734 17805 4032a5 17804->17805 17808 4032aa 17804->17808 17806 405042 19 API calls 17805->17806 17806->17808 17807 402e9f 12 API calls 17809 4032d7 17807->17809 17808->17807 17810 402e56 7 API calls 17809->17810 17815 4032eb 17809->17815 17810->17815 17811 40332e 17812 402f51 7 API calls 17811->17812 17813 40333a 17812->17813 17813->17736 17814 402e9f 12 API calls 17814->17815 17815->17811 17815->17814 17816 402e56 7 API calls 17815->17816 17816->17815 17818 403249 17817->17818 17820 40324e 17817->17820 17819 405042 19 API calls 17818->17819 17819->17820 17820->17739 17822 402e84 17821->17822 17823 402e89 17821->17823 17824 403c20 7 API calls 17822->17824 17825 403c59 7 API calls 17823->17825 17824->17823 17826 402e92 ExitProcess 17825->17826 18031 403009 17827->18031 17830 4030bc 17831 4030c8 17830->17831 17832 4031f1 UnhandledExceptionFilter 17831->17832 17833 402e48 17831->17833 17832->17833 17857 402c40 17834->17857 17836 4038b5 GetVersionExA 17837 4038d1 17836->17837 17838 4038eb GetEnvironmentVariableA 17836->17838 17837->17838 17840 4038e3 17837->17840 17839 4039c8 17838->17839 17842 40390a 17838->17842 17839->17840 17862 40387b GetModuleHandleA 17839->17862 17840->17751 17840->17752 17843 40394f GetModuleFileNameA 17842->17843 17844 403947 17842->17844 17843->17844 17844->17839 17859 40505e 17844->17859 17847 403de3 17846->17847 17847->17755 17849 404625 17848->17849 17850 40462c HeapAlloc 17848->17850 17851 404649 VirtualAlloc 17849->17851 17850->17851 17852 404681 17850->17852 17853 404669 VirtualAlloc 17851->17853 17854 40473e 17851->17854 17852->17755 17853->17852 17855 404730 VirtualFree 17853->17855 17854->17852 17856 404746 HeapFree 17854->17856 17855->17854 17856->17852 17858 402c4c 17857->17858 17858->17836 17858->17858 17864 405075 17859->17864 17863 403892 17862->17863 17863->17840 17866 40508d 17864->17866 17868 4050bd 17866->17868 17871 405d39 17866->17871 17867 405d39 6 API calls 17867->17868 17868->17867 17869 405071 17868->17869 17875 405c6d 17868->17875 17869->17839 17872 405d57 17871->17872 17873 405d4b 17871->17873 17881 405b24 17872->17881 17873->17866 17876 405c98 17875->17876 17880 405c7b 17875->17880 17877 405cb4 17876->17877 17878 405d39 6 API calls 17876->17878 17877->17880 17893 4058d5 17877->17893 17878->17877 17880->17868 17882 405b6d 17881->17882 17883 405b55 GetStringTypeW 17881->17883 17885 405b98 GetStringTypeA 17882->17885 17886 405bbc 17882->17886 17883->17882 17884 405b71 GetStringTypeA 17883->17884 17884->17882 17888 405c59 17884->17888 17885->17888 17886->17888 17889 405bd2 MultiByteToWideChar 17886->17889 17888->17873 17889->17888 17890 405bf6 17889->17890 17890->17888 17891 405c30 MultiByteToWideChar 17890->17891 17891->17888 17892 405c49 GetStringTypeW 17891->17892 17892->17888 17894 405905 LCMapStringW 17893->17894 17895 405921 17893->17895 17894->17895 17896 405929 LCMapStringA 17894->17896 17897 405987 17895->17897 17898 40596a LCMapStringA 17895->17898 17896->17895 17905 405a63 17896->17905 17899 40599d MultiByteToWideChar 17897->17899 17897->17905 17898->17905 17900 4059c7 17899->17900 17899->17905 17901 4059fd MultiByteToWideChar 17900->17901 17900->17905 17902 405a16 LCMapStringW 17901->17902 17901->17905 17903 405a31 17902->17903 17902->17905 17904 405a37 17903->17904 17907 405a77 17903->17907 17904->17905 17906 405a45 LCMapStringW 17904->17906 17905->17880 17906->17905 17907->17905 17908 405aaf LCMapStringW 17907->17908 17908->17905 17909 405ac7 WideCharToMultiByte 17908->17909 17909->17905 17920 402eb1 17911->17920 17914 402e56 17915 402e64 17914->17915 17916 402e5f 17914->17916 17963 403c59 17915->17963 17957 403c20 17916->17957 17921 402eae 17920->17921 17923 402eb8 17920->17923 17921->17761 17921->17914 17923->17921 17924 402edd 17923->17924 17925 402f01 17924->17925 17926 402eec 17924->17926 17928 402f40 HeapAlloc 17925->17928 17929 402efa 17925->17929 17939 404910 17925->17939 17926->17929 17933 404163 17926->17933 17930 402f4f 17928->17930 17929->17928 17929->17930 17931 402eff 17929->17931 17930->17923 17931->17923 17935 404195 17933->17935 17934 404243 17934->17929 17935->17934 17938 404234 17935->17938 17946 40446c 17935->17946 17938->17934 17953 40451d 17938->17953 17940 40491e 17939->17940 17941 404a0a VirtualAlloc 17940->17941 17942 404adf 17940->17942 17945 4049db 17940->17945 17941->17945 17943 404618 5 API calls 17942->17943 17943->17945 17945->17929 17947 4044af HeapAlloc 17946->17947 17948 40447f HeapReAlloc 17946->17948 17950 4044ff 17947->17950 17951 4044d5 VirtualAlloc 17947->17951 17949 40449e 17948->17949 17948->17950 17949->17947 17950->17938 17951->17950 17952 4044ef HeapFree 17951->17952 17952->17950 17954 40452f VirtualAlloc 17953->17954 17956 404578 17954->17956 17956->17934 17958 403c2a 17957->17958 17959 403c59 7 API calls 17958->17959 17962 403c57 17958->17962 17960 403c41 17959->17960 17961 403c59 7 API calls 17960->17961 17961->17962 17962->17915 17966 403c6c 17963->17966 17964 402e6d 17964->17761 17965 403d83 17969 403d96 GetStdHandle WriteFile 17965->17969 17966->17964 17966->17965 17967 403cac 17966->17967 17967->17964 17968 403cb8 GetModuleFileNameA 17967->17968 17970 403cd0 17968->17970 17969->17964 17972 405408 17970->17972 17973 405415 LoadLibraryA 17972->17973 17975 405457 17972->17975 17974 405426 GetProcAddress 17973->17974 17973->17975 17974->17975 17976 40543d GetProcAddress GetProcAddress 17974->17976 17975->17964 17976->17975 17978 402f5d 17977->17978 17987 402f79 17977->17987 17979 402f67 17978->17979 17980 402f7d 17978->17980 17982 402fa9 HeapFree 17979->17982 17983 402f73 17979->17983 17981 402fa8 17980->17981 17985 402f97 17980->17985 17981->17982 17982->17987 17988 403e3a 17983->17988 17994 4048cb 17985->17994 17987->17792 17989 403e78 17988->17989 17993 40412e 17988->17993 17990 404074 VirtualFree 17989->17990 17989->17993 17991 4040d8 17990->17991 17992 4040e7 VirtualFree HeapFree 17991->17992 17991->17993 17992->17993 17993->17987 17995 4048f8 17994->17995 17996 40490e 17994->17996 17995->17996 17998 4047b2 17995->17998 17996->17987 18001 4047bf 17998->18001 17999 40486f 17999->17996 18000 4047e0 VirtualFree 18000->18001 18001->17999 18001->18000 18003 40475c VirtualFree 18001->18003 18004 404779 18003->18004 18005 4047a9 18004->18005 18006 404789 HeapFree 18004->18006 18005->18001 18006->18001 18008 40504b 18007->18008 18009 405052 18007->18009 18011 404c7e 18008->18011 18009->17797 18018 404e17 18011->18018 18013 404e0b 18013->18009 18016 404cc1 GetCPInfo 18017 404cd5 18016->18017 18017->18013 18023 404ebd GetCPInfo 18017->18023 18019 404e37 18018->18019 18020 404e27 GetOEMCP 18018->18020 18021 404c8f 18019->18021 18022 404e3c GetACP 18019->18022 18020->18019 18021->18013 18021->18016 18021->18017 18022->18021 18024 404fa8 18023->18024 18027 404ee0 18023->18027 18024->18013 18025 405b24 6 API calls 18026 404f5c 18025->18026 18028 4058d5 9 API calls 18026->18028 18027->18025 18029 404f80 18028->18029 18030 4058d5 9 API calls 18029->18030 18030->18024 18032 403015 GetCurrentProcess TerminateProcess 18031->18032 18033 403026 18031->18033 18032->18033 18034 402e37 18033->18034 18035 403090 ExitProcess 18033->18035 18034->17830 18036 2c8edef 18039 2c8e4b9 18036->18039 18040 2cbafc9 CreateFileA 18039->18040 18041 2cbe591 18040->18041 18042 402248 18045 401f64 FindResourceA 18042->18045 18044 40224d 18046 401f86 GetLastError SizeofResource 18045->18046 18047 401f9f 18045->18047 18046->18047 18048 401fa6 LoadResource LockResource GlobalAlloc 18046->18048 18047->18044 18049 401fd2 18048->18049 18049->18049 18050 401ffb GetTickCount 18049->18050 18052 402005 GlobalAlloc 18050->18052 18052->18047 18053 2c5104d 18058 2c632e7 18053->18058 18064 2c631eb 18058->18064 18060 2c51057 18061 2c51aa9 InterlockedIncrement 18060->18061 18062 2c51ac5 WSAStartup InterlockedExchange 18061->18062 18063 2c5105c 18061->18063 18062->18063 18065 2c631f7 ___BuildCatchObject 18064->18065 18072 2c684d2 18065->18072 18071 2c6321e ___BuildCatchObject 18071->18060 18089 2c6882d 18072->18089 18074 2c63200 18075 2c6322f RtlDecodePointer RtlDecodePointer 18074->18075 18076 2c6320c 18075->18076 18077 2c6325c 18075->18077 18086 2c63229 18076->18086 18077->18076 18388 2c6909d 18077->18388 18079 2c632bf RtlEncodePointer RtlEncodePointer 18079->18076 18080 2c6326e 18080->18079 18081 2c63293 18080->18081 18395 2c68a3b 18080->18395 18081->18076 18083 2c68a3b __realloc_crt 62 API calls 18081->18083 18084 2c632ad RtlEncodePointer 18081->18084 18085 2c632a7 18083->18085 18084->18079 18085->18076 18085->18084 18422 2c684db 18086->18422 18090 2c68851 RtlEnterCriticalSection 18089->18090 18091 2c6883e 18089->18091 18090->18074 18096 2c688b5 18091->18096 18093 2c68844 18093->18090 18118 2c6837f 18093->18118 18097 2c688c1 ___BuildCatchObject 18096->18097 18109 2c688e0 18097->18109 18125 2c68613 18097->18125 18103 2c688d6 18169 2c6825c 18103->18169 18104 2c688fe 18177 2c65d9b 18104->18177 18105 2c6890d 18108 2c6882d __lock 59 API calls 18105->18108 18111 2c68914 18108->18111 18110 2c68903 ___BuildCatchObject 18109->18110 18172 2c689f4 18109->18172 18110->18093 18112 2c68921 18111->18112 18113 2c68939 18111->18113 18180 2c6914c 18112->18180 18183 2c62eb4 18113->18183 18116 2c6892d 18189 2c68955 18116->18189 18119 2c68613 __FF_MSGBANNER 59 API calls 18118->18119 18120 2c68387 18119->18120 18121 2c68670 __NMSG_WRITE 59 API calls 18120->18121 18122 2c6838f 18121->18122 18358 2c6842e 18122->18358 18192 2c700be 18125->18192 18127 2c6861a 18128 2c700be __NMSG_WRITE 59 API calls 18127->18128 18130 2c68627 18127->18130 18128->18130 18129 2c68670 __NMSG_WRITE 59 API calls 18131 2c6863f 18129->18131 18130->18129 18132 2c68649 18130->18132 18133 2c68670 __NMSG_WRITE 59 API calls 18131->18133 18134 2c68670 18132->18134 18133->18132 18135 2c6868e __NMSG_WRITE 18134->18135 18136 2c700be __NMSG_WRITE 55 API calls 18135->18136 18168 2c687b5 18135->18168 18139 2c686a1 18136->18139 18138 2c6881e 18138->18103 18140 2c687ba GetStdHandle 18139->18140 18141 2c700be __NMSG_WRITE 55 API calls 18139->18141 18144 2c687c8 _strlen 18140->18144 18140->18168 18142 2c686b2 18141->18142 18142->18140 18143 2c686c4 18142->18143 18143->18168 18214 2c6f47d 18143->18214 18146 2c68801 WriteFile 18144->18146 18144->18168 18146->18168 18148 2c68822 18151 2c64e45 __invoke_watson 8 API calls 18148->18151 18149 2c686f1 GetModuleFileNameW 18150 2c68711 18149->18150 18159 2c68721 __NMSG_WRITE 18149->18159 18152 2c6f47d __NMSG_WRITE 55 API calls 18150->18152 18153 2c6882c 18151->18153 18152->18159 18154 2c68851 RtlEnterCriticalSection 18153->18154 18156 2c688b5 __mtinitlocknum 55 API calls 18153->18156 18154->18103 18155 2c68767 18155->18148 18232 2c6f411 18155->18232 18158 2c68844 18156->18158 18158->18154 18163 2c6837f __amsg_exit 55 API calls 18158->18163 18159->18148 18159->18155 18223 2c6f4f2 18159->18223 18162 2c6f411 __NMSG_WRITE 55 API calls 18164 2c6879e 18162->18164 18165 2c68850 18163->18165 18164->18148 18166 2c687a5 18164->18166 18165->18154 18241 2c700fe RtlEncodePointer 18166->18241 18266 2c6448b 18168->18266 18281 2c68228 GetModuleHandleExW 18169->18281 18175 2c68a02 18172->18175 18174 2c688f7 18174->18104 18174->18105 18175->18174 18284 2c62eec 18175->18284 18301 2c69445 Sleep 18175->18301 18304 2c65bb2 GetLastError 18177->18304 18179 2c65da0 18179->18110 18181 2c6915c 18180->18181 18182 2c69169 InitializeCriticalSectionAndSpinCount 18180->18182 18181->18116 18182->18116 18184 2c62ebd HeapFree 18183->18184 18185 2c62ee6 __dosmaperr 18183->18185 18184->18185 18186 2c62ed2 18184->18186 18185->18116 18187 2c65d9b __controlfp_s 57 API calls 18186->18187 18188 2c62ed8 GetLastError 18187->18188 18188->18185 18357 2c68997 RtlLeaveCriticalSection 18189->18357 18191 2c6895c 18191->18110 18193 2c700c8 18192->18193 18194 2c65d9b __controlfp_s 59 API calls 18193->18194 18195 2c700d2 18193->18195 18196 2c700ee 18194->18196 18195->18127 18199 2c64e35 18196->18199 18202 2c64e0a RtlDecodePointer 18199->18202 18203 2c64e1d 18202->18203 18208 2c64e45 IsProcessorFeaturePresent 18203->18208 18206 2c64e0a __controlfp_s 8 API calls 18207 2c64e41 18206->18207 18207->18127 18209 2c64e50 18208->18209 18210 2c64cd8 __call_reportfault 7 API calls 18209->18210 18211 2c64e65 18210->18211 18212 2c69453 __invoke_watson GetCurrentProcess TerminateProcess 18211->18212 18213 2c64e34 18212->18213 18213->18206 18215 2c6f496 18214->18215 18216 2c6f488 18214->18216 18217 2c65d9b __controlfp_s 59 API calls 18215->18217 18216->18215 18219 2c6f4af 18216->18219 18222 2c6f4a0 18217->18222 18218 2c64e35 __controlfp_s 9 API calls 18220 2c686e4 18218->18220 18219->18220 18221 2c65d9b __controlfp_s 59 API calls 18219->18221 18220->18148 18220->18149 18221->18222 18222->18218 18228 2c6f500 18223->18228 18224 2c6f504 18225 2c65d9b __controlfp_s 59 API calls 18224->18225 18226 2c6f509 18224->18226 18227 2c6f534 18225->18227 18226->18155 18229 2c64e35 __controlfp_s 9 API calls 18227->18229 18228->18224 18228->18226 18230 2c6f543 18228->18230 18229->18226 18230->18226 18231 2c65d9b __controlfp_s 59 API calls 18230->18231 18231->18227 18233 2c6f42b 18232->18233 18235 2c6f41d 18232->18235 18234 2c65d9b __controlfp_s 59 API calls 18233->18234 18240 2c6f435 18234->18240 18235->18233 18237 2c6f457 18235->18237 18236 2c64e35 __controlfp_s 9 API calls 18238 2c68787 18236->18238 18237->18238 18239 2c65d9b __controlfp_s 59 API calls 18237->18239 18238->18148 18238->18162 18239->18240 18240->18236 18242 2c70132 ___crtIsPackagedApp 18241->18242 18243 2c701f1 IsDebuggerPresent 18242->18243 18244 2c70141 LoadLibraryExW 18242->18244 18247 2c70216 18243->18247 18248 2c701fb 18243->18248 18245 2c7017e GetProcAddress 18244->18245 18246 2c70158 GetLastError 18244->18246 18252 2c70192 7 API calls 18245->18252 18256 2c7020e 18245->18256 18251 2c70167 LoadLibraryExW 18246->18251 18246->18256 18249 2c70209 18247->18249 18250 2c7021b RtlDecodePointer 18247->18250 18248->18249 18253 2c70202 OutputDebugStringW 18248->18253 18249->18256 18257 2c70242 RtlDecodePointer RtlDecodePointer 18249->18257 18264 2c7025a 18249->18264 18250->18256 18251->18245 18251->18256 18254 2c701ee 18252->18254 18255 2c701da GetProcAddress RtlEncodePointer 18252->18255 18253->18249 18254->18243 18255->18254 18260 2c6448b __NMSG_WRITE 6 API calls 18256->18260 18257->18264 18258 2c7027e RtlDecodePointer 18258->18256 18259 2c70292 RtlDecodePointer 18259->18258 18261 2c70299 18259->18261 18262 2c702e0 18260->18262 18261->18258 18262->18168 18264->18258 18264->18259 18267 2c64495 IsProcessorFeaturePresent 18266->18267 18268 2c64493 18266->18268 18270 2c694cf 18267->18270 18268->18138 18273 2c6947e IsDebuggerPresent 18270->18273 18274 2c69493 __call_reportfault 18273->18274 18279 2c69468 SetUnhandledExceptionFilter UnhandledExceptionFilter 18274->18279 18277 2c6949b __call_reportfault 18280 2c69453 GetCurrentProcess TerminateProcess 18277->18280 18278 2c694b8 18278->18138 18279->18277 18280->18278 18282 2c68241 GetProcAddress 18281->18282 18283 2c68253 ExitProcess 18281->18283 18282->18283 18285 2c62f67 18284->18285 18298 2c62ef8 18284->18298 18286 2c68143 _malloc RtlDecodePointer 18285->18286 18288 2c62f6d 18286->18288 18287 2c62f03 18289 2c68613 __FF_MSGBANNER 58 API calls 18287->18289 18292 2c68670 __NMSG_WRITE 58 API calls 18287->18292 18297 2c6825c _malloc 3 API calls 18287->18297 18287->18298 18290 2c65d9b __controlfp_s 58 API calls 18288->18290 18289->18287 18293 2c62f5f 18290->18293 18291 2c62f2b RtlAllocateHeap 18291->18293 18291->18298 18292->18287 18293->18175 18294 2c62f53 18296 2c65d9b __controlfp_s 58 API calls 18294->18296 18299 2c62f51 18296->18299 18297->18287 18298->18287 18298->18291 18298->18294 18298->18299 18302 2c68143 RtlDecodePointer 18298->18302 18300 2c65d9b __controlfp_s 58 API calls 18299->18300 18300->18293 18301->18175 18303 2c68156 18302->18303 18303->18298 18318 2c6910b 18304->18318 18306 2c65bc7 18307 2c65c15 SetLastError 18306->18307 18321 2c689ac 18306->18321 18307->18179 18311 2c65bee 18312 2c65bf4 18311->18312 18313 2c65c0c 18311->18313 18330 2c65c21 18312->18330 18314 2c62eb4 _free 56 API calls 18313->18314 18317 2c65c12 18314->18317 18316 2c65bfc GetCurrentThreadId 18316->18307 18317->18307 18319 2c69122 TlsGetValue 18318->18319 18320 2c6911e 18318->18320 18319->18306 18320->18306 18324 2c689b3 18321->18324 18323 2c65bda 18323->18307 18327 2c6912a 18323->18327 18324->18323 18326 2c689d1 18324->18326 18340 2c703f8 18324->18340 18326->18323 18326->18324 18348 2c69445 Sleep 18326->18348 18328 2c69144 TlsSetValue 18327->18328 18329 2c69140 18327->18329 18328->18311 18329->18311 18331 2c65c2d ___BuildCatchObject 18330->18331 18332 2c6882d __lock 59 API calls 18331->18332 18333 2c65c6a 18332->18333 18349 2c65cc2 18333->18349 18336 2c6882d __lock 59 API calls 18337 2c65c8b ___addlocaleref 18336->18337 18352 2c65ccb 18337->18352 18339 2c65cb6 ___BuildCatchObject 18339->18316 18341 2c70403 18340->18341 18346 2c7041e 18340->18346 18342 2c7040f 18341->18342 18341->18346 18343 2c65d9b __controlfp_s 58 API calls 18342->18343 18345 2c70414 18343->18345 18344 2c7042e RtlAllocateHeap 18344->18345 18344->18346 18345->18324 18346->18344 18346->18345 18347 2c68143 _malloc RtlDecodePointer 18346->18347 18347->18346 18348->18326 18355 2c68997 RtlLeaveCriticalSection 18349->18355 18351 2c65c84 18351->18336 18356 2c68997 RtlLeaveCriticalSection 18352->18356 18354 2c65cd2 18354->18339 18355->18351 18356->18354 18357->18191 18361 2c684e4 18358->18361 18360 2c6839a 18362 2c684f0 ___BuildCatchObject 18361->18362 18363 2c6882d __lock 52 API calls 18362->18363 18364 2c684f7 18363->18364 18365 2c685b0 _doexit 18364->18365 18366 2c68525 RtlDecodePointer 18364->18366 18381 2c685fe 18365->18381 18366->18365 18368 2c6853c RtlDecodePointer 18366->18368 18374 2c6854c 18368->18374 18370 2c6860d ___BuildCatchObject 18370->18360 18372 2c68559 RtlEncodePointer 18372->18374 18373 2c685f5 18375 2c6825c _malloc 3 API calls 18373->18375 18374->18365 18374->18372 18376 2c68569 RtlDecodePointer RtlEncodePointer 18374->18376 18377 2c685fe 18375->18377 18379 2c6857b RtlDecodePointer RtlDecodePointer 18376->18379 18378 2c6860b 18377->18378 18386 2c68997 RtlLeaveCriticalSection 18377->18386 18378->18360 18379->18374 18382 2c68604 18381->18382 18383 2c685de 18381->18383 18387 2c68997 RtlLeaveCriticalSection 18382->18387 18383->18370 18385 2c68997 RtlLeaveCriticalSection 18383->18385 18385->18373 18386->18378 18387->18383 18389 2c690a6 18388->18389 18390 2c690bb RtlSizeHeap 18388->18390 18391 2c65d9b __controlfp_s 59 API calls 18389->18391 18390->18080 18392 2c690ab 18391->18392 18393 2c64e35 __controlfp_s 9 API calls 18392->18393 18394 2c690b6 18393->18394 18394->18080 18398 2c68a42 18395->18398 18397 2c68a7f 18397->18081 18398->18397 18400 2c702e4 18398->18400 18421 2c69445 Sleep 18398->18421 18401 2c702ed 18400->18401 18402 2c702f8 18400->18402 18404 2c62eec _malloc 59 API calls 18401->18404 18403 2c70300 18402->18403 18413 2c7030d 18402->18413 18405 2c62eb4 _free 59 API calls 18403->18405 18406 2c702f5 18404->18406 18418 2c70308 __dosmaperr 18405->18418 18406->18398 18407 2c70345 18409 2c68143 _malloc RtlDecodePointer 18407->18409 18408 2c70315 RtlReAllocateHeap 18408->18413 18408->18418 18410 2c7034b 18409->18410 18411 2c65d9b __controlfp_s 59 API calls 18410->18411 18411->18418 18412 2c70375 18415 2c65d9b __controlfp_s 59 API calls 18412->18415 18413->18407 18413->18408 18413->18412 18414 2c68143 _malloc RtlDecodePointer 18413->18414 18417 2c7035d 18413->18417 18414->18413 18416 2c7037a GetLastError 18415->18416 18416->18418 18419 2c65d9b __controlfp_s 59 API calls 18417->18419 18418->18398 18420 2c70362 GetLastError 18419->18420 18420->18418 18421->18398 18425 2c68997 RtlLeaveCriticalSection 18422->18425 18424 2c6322e 18424->18071 18425->18424 18426 2c8f140 18427 2c8f143 18426->18427 18432 2c8f299 WriteFile 18427->18432 18434 2c940a2 18427->18434 18437 2caea68 DeleteFileA 18427->18437 18433 2cd3a61 18432->18433 18435 2c9c803 Sleep 18434->18435 18436 2cb0c50 18435->18436 18438 4024e9 lstrcmpiW 18439 4021f2 StartServiceCtrlDispatcherA 18438->18439 18440 4024f7 18438->18440 18443 40ba1e 18439->18443 18442 4027a7 SetEvent 18440->18442 18444 402504 18440->18444 18448 4022cb 18442->18448 18449 40b81f 18448->18449 18450 40b1ec 18451 40b56a 18450->18451 18454 2c63c52 18451->18454 18455 2c63c60 18454->18455 18456 2c63c5b 18454->18456 18460 2c63c75 18455->18460 18468 2c6b821 18456->18468 18459 40b56c Sleep 18461 2c63c81 ___BuildCatchObject 18460->18461 18465 2c63ccf ___DllMainCRTStartup 18461->18465 18467 2c63d2c ___BuildCatchObject 18461->18467 18472 2c63ae0 18461->18472 18463 2c63d09 18464 2c63ae0 __CRT_INIT@12 138 API calls 18463->18464 18463->18467 18464->18467 18465->18463 18466 2c63ae0 __CRT_INIT@12 138 API calls 18465->18466 18465->18467 18466->18463 18467->18459 18469 2c6b844 18468->18469 18470 2c6b851 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 18468->18470 18469->18470 18471 2c6b848 18469->18471 18470->18471 18471->18455 18473 2c63aec ___BuildCatchObject 18472->18473 18474 2c63af4 18473->18474 18475 2c63b6e 18473->18475 18520 2c68126 GetProcessHeap 18474->18520 18477 2c63bd7 18475->18477 18478 2c63b72 18475->18478 18479 2c63bdc 18477->18479 18480 2c63c3a 18477->18480 18483 2c63b93 18478->18483 18513 2c63afd ___BuildCatchObject __CRT_INIT@12 18478->18513 18621 2c6839b 18478->18621 18482 2c6910b __freeptd TlsGetValue 18479->18482 18480->18513 18652 2c65b64 18480->18652 18481 2c63af9 18481->18513 18521 2c65cd4 18481->18521 18486 2c63be7 18482->18486 18624 2c68272 RtlDecodePointer 18483->18624 18491 2c689ac __calloc_crt 59 API calls 18486->18491 18486->18513 18489 2c63b09 __RTC_Initialize 18497 2c63b19 GetCommandLineA 18489->18497 18489->18513 18493 2c63bf8 18491->18493 18492 2c63ba9 __CRT_INIT@12 18648 2c63bc2 18492->18648 18498 2c6912a __freeptd TlsSetValue 18493->18498 18493->18513 18494 2c6b4bf __ioterm 60 API calls 18496 2c63ba4 18494->18496 18499 2c65d4a __mtterm 62 API calls 18496->18499 18542 2c6b8bd GetEnvironmentStringsW 18497->18542 18501 2c63c10 18498->18501 18499->18492 18503 2c63c16 18501->18503 18504 2c63c2e 18501->18504 18506 2c65c21 __initptd 59 API calls 18503->18506 18507 2c62eb4 _free 59 API calls 18504->18507 18509 2c63c1e GetCurrentThreadId 18506->18509 18507->18513 18508 2c63b33 18510 2c63b37 18508->18510 18574 2c6b511 18508->18574 18509->18513 18607 2c65d4a 18510->18607 18513->18465 18515 2c63b57 18515->18513 18520->18481 18660 2c68442 RtlEncodePointer 18521->18660 18523 2c65cd9 18665 2c6895e 18523->18665 18526 2c65ce2 18527 2c65d4a __mtterm 62 API calls 18526->18527 18529 2c65ce7 18527->18529 18529->18489 18531 2c65cff 18532 2c689ac __calloc_crt 59 API calls 18531->18532 18533 2c65d0c 18532->18533 18534 2c65d41 18533->18534 18535 2c6912a __freeptd TlsSetValue 18533->18535 18536 2c65d4a __mtterm 62 API calls 18534->18536 18537 2c65d20 18535->18537 18538 2c65d46 18536->18538 18537->18534 18539 2c65d26 18537->18539 18538->18489 18540 2c65c21 __initptd 59 API calls 18539->18540 18541 2c65d2e GetCurrentThreadId 18540->18541 18541->18489 18543 2c63b29 18542->18543 18544 2c6b8d0 WideCharToMultiByte 18542->18544 18555 2c6b20b 18543->18555 18546 2c6b903 18544->18546 18547 2c6b93a FreeEnvironmentStringsW 18544->18547 18548 2c689f4 __malloc_crt 59 API calls 18546->18548 18547->18543 18549 2c6b909 18548->18549 18549->18547 18550 2c6b910 WideCharToMultiByte 18549->18550 18551 2c6b926 18550->18551 18552 2c6b92f FreeEnvironmentStringsW 18550->18552 18553 2c62eb4 _free 59 API calls 18551->18553 18552->18543 18554 2c6b92c 18553->18554 18554->18552 18556 2c6b217 ___BuildCatchObject 18555->18556 18557 2c6882d __lock 59 API calls 18556->18557 18558 2c6b21e 18557->18558 18559 2c689ac __calloc_crt 59 API calls 18558->18559 18561 2c6b22f 18559->18561 18560 2c6b29a GetStartupInfoW 18568 2c6b2af 18560->18568 18569 2c6b3de 18560->18569 18561->18560 18562 2c6b23a ___BuildCatchObject @_EH4_CallFilterFunc@8 18561->18562 18562->18508 18563 2c6b4a6 18673 2c6b4b6 18563->18673 18565 2c689ac __calloc_crt 59 API calls 18565->18568 18566 2c6b42b GetStdHandle 18566->18569 18567 2c6b43e GetFileType 18567->18569 18568->18565 18568->18569 18571 2c6b2fd 18568->18571 18569->18563 18569->18566 18569->18567 18573 2c6914c __ioinit InitializeCriticalSectionAndSpinCount 18569->18573 18570 2c6b331 GetFileType 18570->18571 18571->18569 18571->18570 18572 2c6914c __ioinit InitializeCriticalSectionAndSpinCount 18571->18572 18572->18571 18573->18569 18575 2c6b524 GetModuleFileNameA 18574->18575 18576 2c6b51f 18574->18576 18578 2c6b551 18575->18578 18683 2c651ca 18576->18683 18677 2c6b5c4 18578->18677 18581 2c63b43 18581->18515 18585 2c6b740 18581->18585 18582 2c689f4 __malloc_crt 59 API calls 18583 2c6b58a 18582->18583 18583->18581 18608 2c65d54 18607->18608 18610 2c65d5a 18607->18610 18859 2c690ec 18608->18859 18611 2c68893 18610->18611 18612 2c68877 RtlDeleteCriticalSection 18610->18612 18614 2c6889f RtlDeleteCriticalSection 18611->18614 18615 2c688b2 18611->18615 18613 2c62eb4 _free 59 API calls 18612->18613 18613->18610 18614->18611 18615->18513 18622 2c684e4 _doexit 59 API calls 18621->18622 18623 2c683a6 18622->18623 18623->18483 18625 2c6829e 18624->18625 18626 2c6828c 18624->18626 18627 2c62eb4 _free 59 API calls 18625->18627 18626->18625 18628 2c62eb4 _free 59 API calls 18626->18628 18634 2c682ab 18627->18634 18628->18626 18629 2c682cf 18630 2c62eb4 _free 59 API calls 18629->18630 18632 2c682db 18630->18632 18631 2c62eb4 _free 59 API calls 18631->18634 18633 2c62eb4 _free 59 API calls 18632->18633 18635 2c682ec 18633->18635 18634->18629 18634->18631 18636 2c62eb4 _free 59 API calls 18635->18636 18637 2c682f7 18636->18637 18638 2c6831c RtlEncodePointer 18637->18638 18641 2c62eb4 _free 59 API calls 18637->18641 18639 2c68331 18638->18639 18640 2c68337 18638->18640 18642 2c62eb4 _free 59 API calls 18639->18642 18643 2c6834d 18640->18643 18646 2c62eb4 _free 59 API calls 18640->18646 18645 2c6831b 18641->18645 18642->18640 18644 2c63b98 18643->18644 18647 2c62eb4 _free 59 API calls 18643->18647 18644->18492 18644->18494 18645->18638 18646->18643 18647->18644 18649 2c63bc6 18648->18649 18650 2c63bd4 18648->18650 18649->18650 18651 2c65d4a __mtterm 62 API calls 18649->18651 18650->18513 18651->18650 18653 2c65b71 18652->18653 18654 2c65b97 18652->18654 18655 2c65b7f 18653->18655 18656 2c6910b __freeptd TlsGetValue 18653->18656 18654->18513 18657 2c6912a __freeptd TlsSetValue 18655->18657 18656->18655 18658 2c65b8f 18657->18658 18862 2c65a2f 18658->18862 18661 2c68453 __init_pointers __initp_misc_winsig 18660->18661 18672 2c6394a RtlEncodePointer 18661->18672 18663 2c6846b __init_pointers 18664 2c691ba 34 API calls 18663->18664 18664->18523 18666 2c6896a 18665->18666 18667 2c65cde 18666->18667 18668 2c6914c __ioinit InitializeCriticalSectionAndSpinCount 18666->18668 18667->18526 18669 2c690ce 18667->18669 18668->18666 18670 2c690e5 TlsAlloc 18669->18670 18671 2c65cf4 18669->18671 18671->18526 18671->18531 18672->18663 18676 2c68997 RtlLeaveCriticalSection 18673->18676 18675 2c6b4bd 18675->18562 18676->18675 18679 2c6b5e6 18677->18679 18681 2c6b64a 18679->18681 18687 2c71516 18679->18687 18680 2c6b567 18680->18581 18680->18582 18681->18680 18682 2c71516 _parse_cmdline 59 API calls 18681->18682 18682->18681 18684 2c651da 18683->18684 18685 2c651d3 18683->18685 18684->18575 18743 2c65527 18685->18743 18690 2c714bc 18687->18690 18693 2c621bb 18690->18693 18694 2c621cc 18693->18694 18698 2c62219 18693->18698 18698->18679 18744 2c65533 ___BuildCatchObject 18743->18744 18745 2c65b9a ___InternalCxxFrameHandler 59 API calls 18744->18745 18746 2c6553b 18745->18746 18747 2c65481 __setmbcp 59 API calls 18746->18747 18860 2c69103 TlsFree 18859->18860 18861 2c690ff 18859->18861 18860->18610 18861->18610 18864 2c65a3b ___BuildCatchObject 18862->18864 18863 2c65a54 18867 2c65a63 18863->18867 18868 2c62eb4 _free 59 API calls 18863->18868 18864->18863 18865 2c65b43 ___BuildCatchObject 18864->18865 18866 2c62eb4 _free 59 API calls 18864->18866 18865->18654 18866->18863 18869 2c65a72 18867->18869 18871 2c62eb4 _free 59 API calls 18867->18871 18868->18867 18870 2c65a81 18869->18870 18872 2c62eb4 _free 59 API calls 18869->18872 18873 2c65a90 18870->18873 18874 2c62eb4 _free 59 API calls 18870->18874 18871->18869 18872->18870 18875 2c65a9f 18873->18875 18876 2c62eb4 _free 59 API calls 18873->18876 18874->18873 18877 2c65aae 18875->18877 18879 2c62eb4 _free 59 API calls 18875->18879 18876->18875 18878 2c65ac0 18877->18878 18880 2c62eb4 _free 59 API calls 18877->18880 18881 2c6882d __lock 59 API calls 18878->18881 18879->18877 18880->18878 18883 2c65ac8 18881->18883 18886 2c62eb4 _free 59 API calls 18883->18886 18887 2c65aeb 18883->18887 18885 2c6882d __lock 59 API calls 18892 2c65aff ___removelocaleref 18885->18892 18886->18887 18894 2c65b4f 18887->18894 18888 2c65b30 18927 2c65b5b 18888->18927 18891 2c62eb4 _free 59 API calls 18891->18865 18892->18888 18897 2c64f05 18892->18897 18930 2c68997 RtlLeaveCriticalSection 18894->18930 18896 2c65af8 18896->18885 18898 2c64f7e 18897->18898 18901 2c64f1a 18897->18901 18899 2c62eb4 _free 59 API calls 18898->18899 18900 2c64fcb 18898->18900 18902 2c64f9f 18899->18902 18903 2c64ff4 18900->18903 18971 2c6d47d 18900->18971 18901->18898 18908 2c62eb4 _free 59 API calls 18901->18908 18911 2c64f4b 18901->18911 18905 2c62eb4 _free 59 API calls 18902->18905 18909 2c65053 18903->18909 18924 2c62eb4 59 API calls _free 18903->18924 18910 2c64fb2 18905->18910 18907 2c62eb4 _free 59 API calls 18907->18903 18913 2c64f40 18908->18913 18914 2c62eb4 _free 59 API calls 18909->18914 18915 2c62eb4 _free 59 API calls 18910->18915 18916 2c62eb4 _free 59 API calls 18911->18916 18926 2c64f69 18911->18926 18912 2c62eb4 _free 59 API calls 18917 2c64f73 18912->18917 18931 2c6d31a 18913->18931 18919 2c65059 18914->18919 18920 2c64fc0 18915->18920 18921 2c64f5e 18916->18921 18922 2c62eb4 _free 59 API calls 18917->18922 18919->18888 18923 2c62eb4 _free 59 API calls 18920->18923 18959 2c6d416 18921->18959 18922->18898 18923->18900 18924->18903 18926->18912 19147 2c68997 RtlLeaveCriticalSection 18927->19147 18929 2c65b3d 18929->18891 18930->18896 18932 2c6d329 18931->18932 18958 2c6d412 18931->18958 18933 2c6d33a 18932->18933 18934 2c62eb4 _free 59 API calls 18932->18934 18935 2c62eb4 _free 59 API calls 18933->18935 18937 2c6d34c 18933->18937 18934->18933 18935->18937 18936 2c6d35e 18938 2c6d370 18936->18938 18940 2c62eb4 _free 59 API calls 18936->18940 18937->18936 18939 2c62eb4 _free 59 API calls 18937->18939 18941 2c6d382 18938->18941 18942 2c62eb4 _free 59 API calls 18938->18942 18939->18936 18940->18938 18942->18941 18958->18911 18960 2c6d421 18959->18960 18970 2c6d479 18959->18970 18961 2c6d431 18960->18961 18963 2c62eb4 _free 59 API calls 18960->18963 18962 2c6d443 18961->18962 18964 2c62eb4 _free 59 API calls 18961->18964 18965 2c62eb4 _free 59 API calls 18962->18965 18966 2c6d455 18962->18966 18963->18961 18964->18962 18965->18966 18967 2c6d467 18966->18967 18968 2c62eb4 _free 59 API calls 18966->18968 18967->18970 18968->18967 18970->18926 18972 2c6d48c 18971->18972 18973 2c64fe9 18971->18973 18974 2c62eb4 _free 59 API calls 18972->18974 18973->18907 18975 2c6d494 18974->18975 18976 2c62eb4 _free 59 API calls 18975->18976 18977 2c6d49c 18976->18977 18978 2c62eb4 _free 59 API calls 18977->18978 18979 2c6d4a4 18978->18979 19147->18929 19148 2c5648b RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19226 2c542c7 19148->19226 19227 2c572ab InternetOpenA 19228 2c572c9 InternetSetOptionA InternetSetOptionA InternetSetOptionA 19227->19228 19262 2c566f4 shared_ptr __setmbcp_nolock 19227->19262 19235 2c57342 __setmbcp_nolock 19228->19235 19229 2c57322 InternetOpenUrlA 19230 2c57382 InternetCloseHandle 19229->19230 19229->19235 19230->19262 19231 2c5670e RtlEnterCriticalSection RtlLeaveCriticalSection 19231->19262 19232 2c56708 Sleep 19232->19231 19233 2c57346 InternetReadFile 19234 2c57377 InternetCloseHandle 19233->19234 19233->19235 19234->19230 19235->19229 19235->19233 19236 2c573e9 RtlEnterCriticalSection RtlLeaveCriticalSection 19338 2c6227c 19236->19338 19238 2c62eec _malloc 59 API calls 19239 2c5749d RtlEnterCriticalSection RtlLeaveCriticalSection 19238->19239 19239->19262 19240 2c6227c 66 API calls 19240->19262 19241 2c5776a RtlEnterCriticalSection RtlLeaveCriticalSection 19241->19262 19243 2c62eec 59 API calls _malloc 19243->19262 19246 2c578e2 RtlEnterCriticalSection 19247 2c5790f RtlLeaveCriticalSection 19246->19247 19246->19262 19396 2c53c67 19247->19396 19249 2c62eb4 59 API calls _free 19249->19262 19253 2c5a65c 73 API calls 19253->19262 19260 2c63529 60 API calls _strtok 19260->19262 19262->19227 19262->19231 19262->19232 19262->19236 19262->19238 19262->19240 19262->19241 19262->19243 19262->19246 19262->19247 19262->19249 19262->19253 19262->19260 19262->19262 19266 2c576e7 shared_ptr 19262->19266 19267 2c576ec Sleep 19262->19267 19270 2c55119 19262->19270 19299 2c5ab46 19262->19299 19309 2c561f5 19262->19309 19312 2c58272 19262->19312 19318 2c5d04e 19262->19318 19323 2c58321 19262->19323 19331 2c533b2 19262->19331 19348 2c62790 19262->19348 19351 2c63a8f 19262->19351 19359 2c5966e 19262->19359 19366 2c5a786 19262->19366 19374 2c54100 19262->19374 19378 2c62358 19262->19378 19387 2c51ba7 19262->19387 19403 2c53d7e 19262->19403 19410 2c58f3a 19262->19410 19417 2c5534d 19262->19417 19266->19267 19370 2c61830 19267->19370 19271 2c55123 __EH_prolog 19270->19271 19427 2c60a50 19271->19427 19274 2c53c67 72 API calls 19275 2c5514a 19274->19275 19276 2c53d7e 64 API calls 19275->19276 19277 2c55158 19276->19277 19278 2c58272 89 API calls 19277->19278 19279 2c5516c 19278->19279 19280 2c55322 shared_ptr 19279->19280 19431 2c5a65c 19279->19431 19280->19262 19283 2c551c4 19285 2c5a65c 73 API calls 19283->19285 19284 2c551f6 19286 2c5a65c 73 API calls 19284->19286 19288 2c551d4 19285->19288 19287 2c55207 19286->19287 19287->19280 19289 2c5a65c 73 API calls 19287->19289 19288->19280 19291 2c5a65c 73 API calls 19288->19291 19290 2c5524a 19289->19290 19290->19280 19293 2c5a65c 73 API calls 19290->19293 19292 2c552b4 19291->19292 19292->19280 19294 2c5a65c 73 API calls 19292->19294 19293->19288 19295 2c552da 19294->19295 19295->19280 19296 2c5a65c 73 API calls 19295->19296 19297 2c55304 19296->19297 19436 2c5ce10 19297->19436 19300 2c5ab50 __EH_prolog 19299->19300 19487 2c5d025 19300->19487 19302 2c5ab71 shared_ptr 19490 2c62030 19302->19490 19304 2c5ab88 19305 2c5ab9e 19304->19305 19496 2c53fb0 19304->19496 19305->19262 19310 2c62eec _malloc 59 API calls 19309->19310 19311 2c56208 19310->19311 19313 2c582ab 19312->19313 19314 2c5828a 19312->19314 19317 2c582d0 19313->19317 19945 2c52ac7 19313->19945 19942 2c59534 19314->19942 19317->19262 19319 2c60a50 Mailbox 68 API calls 19318->19319 19321 2c5d064 19319->19321 19320 2c5d152 19320->19262 19321->19320 19322 2c52db5 73 API calls 19321->19322 19322->19321 19324 2c5833c WSASetLastError shutdown 19323->19324 19325 2c5832c 19323->19325 19327 2c5a440 69 API calls 19324->19327 19326 2c60a50 Mailbox 68 API calls 19325->19326 19329 2c58331 19326->19329 19328 2c58359 19327->19328 19328->19329 19330 2c60a50 Mailbox 68 API calls 19328->19330 19329->19262 19330->19329 19332 2c533c4 InterlockedCompareExchange 19331->19332 19333 2c533e1 19331->19333 19332->19333 19335 2c533d6 19332->19335 19334 2c529ee 76 API calls 19333->19334 19336 2c533f1 19334->19336 20039 2c532ab 19335->20039 19336->19262 19340 2c62288 19338->19340 19343 2c622ab 19338->19343 19341 2c6228e 19340->19341 19340->19343 19342 2c65d9b __controlfp_s 59 API calls 19341->19342 19345 2c62293 19342->19345 20092 2c622c3 19343->20092 19344 2c622be 19344->19262 19346 2c64e35 __controlfp_s 9 API calls 19345->19346 19347 2c6229e 19346->19347 19347->19262 20102 2c627ae 19348->20102 19350 2c627a9 19350->19262 19353 2c63a97 19351->19353 19352 2c62eec _malloc 59 API calls 19352->19353 19353->19352 19354 2c63ab1 19353->19354 19355 2c68143 _malloc RtlDecodePointer 19353->19355 19356 2c63ab5 std::exception::exception 19353->19356 19354->19262 19355->19353 19357 2c6449a __CxxThrowException@8 RaiseException 19356->19357 19358 2c63adf 19357->19358 19360 2c59678 __EH_prolog 19359->19360 19361 2c51ba7 210 API calls 19360->19361 19362 2c596cd 19361->19362 19363 2c596ea RtlEnterCriticalSection 19362->19363 19364 2c59705 19363->19364 19365 2c59708 RtlLeaveCriticalSection 19363->19365 19364->19365 19365->19262 19367 2c5a790 __EH_prolog 19366->19367 20108 2c5df37 19367->20108 19369 2c5a7ae shared_ptr 19369->19262 19371 2c61861 19370->19371 19372 2c6183d 19370->19372 19371->19262 19372->19371 19373 2c61851 GetProcessHeap HeapFree 19372->19373 19373->19371 19375 2c54112 19374->19375 19376 2c54118 19374->19376 20112 2c5a63a 19375->20112 19376->19262 19379 2c62374 19378->19379 19380 2c62389 19378->19380 19381 2c65d9b __controlfp_s 59 API calls 19379->19381 19380->19379 19384 2c62390 19380->19384 19382 2c62379 19381->19382 19383 2c64e35 __controlfp_s 9 API calls 19382->19383 19385 2c62384 19383->19385 19384->19385 20114 2c65e41 19384->20114 19385->19262 20315 2c75330 19387->20315 19389 2c51bb1 RtlEnterCriticalSection 19390 2c51be9 RtlLeaveCriticalSection 19389->19390 19392 2c51bd1 19389->19392 20316 2c5e267 19390->20316 19392->19390 19393 2c51c55 RtlLeaveCriticalSection 19392->19393 19393->19262 19394 2c51c22 19394->19393 19397 2c60a50 Mailbox 68 API calls 19396->19397 19398 2c53c7e 19397->19398 20398 2c53ca2 19398->20398 19404 2c53d99 htons 19403->19404 19405 2c53dcb htons 19403->19405 20425 2c53bd3 19404->20425 20431 2c53c16 19405->20431 19409 2c53ded 19409->19262 19411 2c58f44 __EH_prolog 19410->19411 20462 2c5373f 19411->20462 19413 2c58f5e RtlEnterCriticalSection 19414 2c58f6d RtlLeaveCriticalSection 19413->19414 19416 2c58fa7 19414->19416 19416->19262 19418 2c62eec _malloc 59 API calls 19417->19418 19419 2c55362 SHGetSpecialFolderPathA 19418->19419 19420 2c55378 19419->19420 20471 2c636b4 19420->20471 19423 2c553e2 19423->19262 19425 2c553dc 20487 2c639c7 19425->20487 19428 2c5513d 19427->19428 19429 2c60a79 19427->19429 19428->19274 19430 2c632e7 __cinit 68 API calls 19429->19430 19430->19428 19432 2c60a50 Mailbox 68 API calls 19431->19432 19433 2c5a676 19432->19433 19434 2c5519d 19433->19434 19441 2c52db5 19433->19441 19434->19280 19434->19283 19434->19284 19437 2c60a50 Mailbox 68 API calls 19436->19437 19438 2c5ce2a 19437->19438 19439 2c5cf39 19438->19439 19468 2c52b95 19438->19468 19439->19280 19442 2c52de4 19441->19442 19443 2c52dca 19441->19443 19445 2c52dfc 19442->19445 19446 2c52def 19442->19446 19444 2c60a50 Mailbox 68 API calls 19443->19444 19449 2c52dcf 19444->19449 19455 2c52d39 WSASetLastError WSASend 19445->19455 19448 2c60a50 Mailbox 68 API calls 19446->19448 19448->19449 19449->19433 19450 2c52e54 WSASetLastError select 19465 2c5a440 19450->19465 19451 2c60a50 68 API calls Mailbox 19453 2c52e0c 19451->19453 19453->19449 19453->19450 19453->19451 19454 2c52d39 71 API calls 19453->19454 19454->19453 19456 2c5a440 69 API calls 19455->19456 19457 2c52d6e 19456->19457 19458 2c52d75 19457->19458 19459 2c52d82 19457->19459 19460 2c60a50 Mailbox 68 API calls 19458->19460 19461 2c60a50 Mailbox 68 API calls 19459->19461 19462 2c52d7a 19459->19462 19460->19462 19461->19462 19463 2c52d9c 19462->19463 19464 2c60a50 Mailbox 68 API calls 19462->19464 19463->19453 19464->19463 19466 2c60a50 Mailbox 68 API calls 19465->19466 19467 2c5a44c WSAGetLastError 19466->19467 19467->19453 19469 2c52bc7 19468->19469 19470 2c52bb1 19468->19470 19472 2c52bd2 19469->19472 19481 2c52bdf 19469->19481 19471 2c60a50 Mailbox 68 API calls 19470->19471 19474 2c52bb6 19471->19474 19475 2c60a50 Mailbox 68 API calls 19472->19475 19473 2c52be2 WSASetLastError WSARecv 19476 2c5a440 69 API calls 19473->19476 19474->19438 19475->19474 19476->19481 19477 2c52d22 19483 2c51996 19477->19483 19479 2c52cbc WSASetLastError select 19480 2c5a440 69 API calls 19479->19480 19480->19481 19481->19473 19481->19474 19481->19477 19481->19479 19482 2c60a50 68 API calls Mailbox 19481->19482 19482->19481 19484 2c519bb 19483->19484 19485 2c5199f 19483->19485 19484->19474 19486 2c632e7 __cinit 68 API calls 19485->19486 19486->19484 19509 2c5e1b7 19487->19509 19489 2c5d037 19489->19302 19594 2c632fc 19490->19594 19493 2c62054 19493->19304 19494 2c6207d ResumeThread 19494->19304 19495 2c62076 CloseHandle 19495->19494 19497 2c60a50 Mailbox 68 API calls 19496->19497 19498 2c53fb8 19497->19498 19913 2c51815 19498->19913 19501 2c5a5c2 19502 2c5a5cc __EH_prolog 19501->19502 19919 2c5cb7a 19502->19919 19510 2c5e1c1 __EH_prolog 19509->19510 19515 2c54030 19510->19515 19514 2c5e1ef 19514->19489 19527 2c75330 19515->19527 19517 2c5403a GetProcessHeap RtlAllocateHeap 19518 2c54053 std::exception::exception 19517->19518 19519 2c5407c 19517->19519 19528 2c5a601 19518->19528 19519->19514 19521 2c5408a 19519->19521 19522 2c54094 __EH_prolog 19521->19522 19575 2c5a220 19522->19575 19527->19517 19529 2c5a60b __EH_prolog 19528->19529 19536 2c5cbb0 19529->19536 19535 2c5a639 19545 2c5d710 19536->19545 19539 2c5cbca 19567 2c5d748 19539->19567 19541 2c5a628 19542 2c6449a 19541->19542 19543 2c644b9 RaiseException 19542->19543 19543->19535 19548 2c62453 19545->19548 19551 2c62481 19548->19551 19552 2c6248f 19551->19552 19556 2c5a61a 19551->19556 19557 2c62517 19552->19557 19556->19539 19558 2c62520 19557->19558 19559 2c62494 19557->19559 19560 2c62eb4 _free 59 API calls 19558->19560 19559->19556 19561 2c624d9 19559->19561 19560->19559 19562 2c624e5 _strlen 19561->19562 19565 2c6250a 19561->19565 19563 2c62eec _malloc 59 API calls 19562->19563 19564 2c624f7 19563->19564 19564->19565 19566 2c66bfc __cftoe2_l 59 API calls 19564->19566 19565->19556 19566->19565 19568 2c5d752 __EH_prolog 19567->19568 19571 2c5b673 19568->19571 19570 2c5d789 Mailbox 19570->19541 19572 2c5b67d __EH_prolog 19571->19572 19573 2c62453 std::exception::exception 59 API calls 19572->19573 19574 2c5b68e Mailbox 19573->19574 19574->19570 19586 2c5b037 19575->19586 19578 2c53fdc 19593 2c75330 19578->19593 19580 2c53fe6 CreateEventA 19581 2c53ffd 19580->19581 19582 2c5400f 19580->19582 19583 2c53fb0 Mailbox 68 API calls 19581->19583 19582->19514 19584 2c54005 19583->19584 19585 2c5a5c2 Mailbox 60 API calls 19584->19585 19585->19582 19587 2c5b043 19586->19587 19588 2c540c1 19586->19588 19589 2c63a8f _Allocate 60 API calls 19587->19589 19590 2c5b053 std::exception::exception 19587->19590 19588->19578 19589->19590 19590->19588 19591 2c6449a __CxxThrowException@8 RaiseException 19590->19591 19592 2c5fa68 19591->19592 19593->19580 19595 2c6331e 19594->19595 19596 2c6330a 19594->19596 19598 2c689ac __calloc_crt 59 API calls 19595->19598 19597 2c65d9b __controlfp_s 59 API calls 19596->19597 19599 2c6330f 19597->19599 19600 2c6332b 19598->19600 19601 2c64e35 __controlfp_s 9 API calls 19599->19601 19602 2c6337c 19600->19602 19604 2c65b9a ___InternalCxxFrameHandler 59 API calls 19600->19604 19607 2c6204b 19601->19607 19603 2c62eb4 _free 59 API calls 19602->19603 19605 2c63382 19603->19605 19606 2c63338 19604->19606 19605->19607 19613 2c65d7a 19605->19613 19608 2c65c21 __initptd 59 API calls 19606->19608 19607->19493 19607->19494 19607->19495 19610 2c63341 CreateThread 19608->19610 19610->19607 19612 2c63374 GetLastError 19610->19612 19621 2c6345c 19610->19621 19612->19602 19618 2c65d67 19613->19618 19615 2c65d83 __dosmaperr 19616 2c65d9b __controlfp_s 59 API calls 19615->19616 19617 2c65d96 19616->19617 19617->19607 19619 2c65bb2 __getptd_noexit 59 API calls 19618->19619 19620 2c65d6c 19619->19620 19620->19615 19622 2c63465 __threadstartex@4 19621->19622 19623 2c6910b __freeptd TlsGetValue 19622->19623 19624 2c6346b 19623->19624 19625 2c6349e 19624->19625 19627 2c63472 __threadstartex@4 19624->19627 19626 2c65a2f __freefls@4 59 API calls 19625->19626 19633 2c634b9 ___crtIsPackagedApp 19626->19633 19628 2c6912a __freeptd TlsSetValue 19627->19628 19629 2c63481 19628->19629 19630 2c63487 GetLastError RtlExitUserThread 19629->19630 19631 2c63494 GetCurrentThreadId 19629->19631 19630->19631 19631->19633 19632 2c634cd 19643 2c63395 19632->19643 19633->19632 19637 2c63404 19633->19637 19638 2c63446 RtlDecodePointer 19637->19638 19639 2c6340d LoadLibraryExW GetProcAddress 19637->19639 19642 2c63456 19638->19642 19640 2c63430 RtlEncodePointer 19639->19640 19641 2c6342f 19639->19641 19640->19638 19641->19632 19642->19632 19644 2c633a1 ___BuildCatchObject 19643->19644 19645 2c65b9a ___InternalCxxFrameHandler 59 API calls 19644->19645 19646 2c633a6 19645->19646 19653 2c620a0 19646->19653 19671 2c61550 19653->19671 19656 2c620f0 19693 2c5dceb 19656->19693 19657 2c620e8 TlsSetValue 19657->19656 19675 2c615b4 19671->19675 19672 2c61630 19673 2c61646 19672->19673 19676 2c61643 CloseHandle 19672->19676 19678 2c6448b __NMSG_WRITE 6 API calls 19673->19678 19674 2c615cc 19677 2c6160e ResetEvent 19674->19677 19680 2c615e5 OpenEventA 19674->19680 19709 2c61b50 19674->19709 19675->19672 19675->19674 19681 2c616dc WaitForSingleObject 19675->19681 19687 2c616b0 CreateEventA 19675->19687 19690 2c61b50 GetCurrentProcessId 19675->19690 19692 2c616ce CloseHandle 19675->19692 19676->19673 19679 2c61615 19677->19679 19682 2c6165e 19678->19682 19713 2c61790 19679->19713 19684 2c61607 19680->19684 19685 2c615ff 19680->19685 19681->19675 19682->19656 19682->19657 19684->19677 19684->19679 19685->19684 19686 2c61604 CloseHandle 19685->19686 19686->19684 19687->19675 19688 2c615e2 19688->19680 19690->19675 19692->19675 19723 2c60bb0 19709->19723 19711 2c61ba2 GetCurrentProcessId 19712 2c61bb5 19711->19712 19712->19688 19718 2c6179f 19713->19718 19714 2c617f7 19715 2c61803 SetEvent 19714->19715 19716 2c6162d 19714->19716 19715->19716 19716->19672 19717 2c617d5 CreateEventA 19717->19714 19719 2c617eb 19717->19719 19718->19714 19718->19717 19720 2c61b50 GetCurrentProcessId 19718->19720 19719->19714 19722 2c617d2 19720->19722 19722->19717 19723->19711 19916 2c62413 19913->19916 19917 2c624d9 std::exception::_Copy_str 59 API calls 19916->19917 19918 2c5182a 19917->19918 19918->19501 19925 2c5d641 19919->19925 19922 2c5cb94 19934 2c5d679 19922->19934 19928 2c5b165 19925->19928 19929 2c5b16f __EH_prolog 19928->19929 19930 2c62453 std::exception::exception 59 API calls 19929->19930 19931 2c5b180 19930->19931 19932 2c57c35 std::bad_exception::bad_exception 60 API calls 19931->19932 19933 2c5a5e1 19932->19933 19933->19922 19935 2c5d683 __EH_prolog 19934->19935 19938 2c5b55d 19935->19938 19939 2c5b567 __EH_prolog 19938->19939 19963 2c5353e 19942->19963 19946 2c52ae8 WSASetLastError connect 19945->19946 19947 2c52ad8 19945->19947 19949 2c5a440 69 API calls 19946->19949 19948 2c60a50 Mailbox 68 API calls 19947->19948 19950 2c52add 19948->19950 19951 2c52b07 19949->19951 19953 2c60a50 Mailbox 68 API calls 19950->19953 19951->19950 19952 2c60a50 Mailbox 68 API calls 19951->19952 19952->19950 19954 2c52b1b 19953->19954 19956 2c60a50 Mailbox 68 API calls 19954->19956 19957 2c52b38 19954->19957 19956->19957 19959 2c52b87 19957->19959 20023 2c53027 19957->20023 19959->19317 19962 2c60a50 Mailbox 68 API calls 19962->19959 19964 2c53548 __EH_prolog 19963->19964 19965 2c53557 19964->19965 19966 2c53576 19964->19966 19968 2c51996 68 API calls 19965->19968 19985 2c52edd WSASetLastError WSASocketA 19966->19985 19971 2c5355f 19968->19971 19970 2c535ad CreateIoCompletionPort 19972 2c535c5 GetLastError 19970->19972 19973 2c535db 19970->19973 19971->19313 19974 2c60a50 Mailbox 68 API calls 19972->19974 19975 2c60a50 Mailbox 68 API calls 19973->19975 19976 2c535d2 19974->19976 19975->19976 19977 2c53626 19976->19977 19978 2c535ef 19976->19978 20011 2c5de2a 19977->20011 19979 2c60a50 Mailbox 68 API calls 19978->19979 19980 2c53608 19979->19980 19993 2c529ee 19980->19993 19983 2c53659 19984 2c60a50 Mailbox 68 API calls 19983->19984 19984->19971 19986 2c60a50 Mailbox 68 API calls 19985->19986 19987 2c52f0a WSAGetLastError 19986->19987 19988 2c52f21 19987->19988 19989 2c52f41 19987->19989 19990 2c52f27 setsockopt 19988->19990 19991 2c52f3c 19988->19991 19989->19970 19989->19971 19990->19991 19992 2c60a50 Mailbox 68 API calls 19991->19992 19992->19989 19994 2c52a0c 19993->19994 20010 2c52aad 19993->20010 19995 2c52a39 WSASetLastError closesocket 19994->19995 19999 2c60a50 Mailbox 68 API calls 19994->19999 19997 2c5a440 69 API calls 19995->19997 19996 2c60a50 Mailbox 68 API calls 19998 2c52ab8 19996->19998 20000 2c52a51 19997->20000 19998->19971 20001 2c52a21 19999->20001 20002 2c60a50 Mailbox 68 API calls 20000->20002 20000->20010 20015 2c52f50 20001->20015 20004 2c52a5c 20002->20004 20006 2c52a7b ioctlsocket WSASetLastError closesocket 20004->20006 20007 2c60a50 Mailbox 68 API calls 20004->20007 20009 2c5a440 69 API calls 20006->20009 20008 2c52a6e 20007->20008 20008->20006 20008->20010 20009->20010 20010->19996 20010->19998 20012 2c5de34 __EH_prolog 20011->20012 20013 2c63a8f _Allocate 60 API calls 20012->20013 20014 2c5de48 20013->20014 20014->19983 20016 2c52f70 WSASetLastError setsockopt 20015->20016 20017 2c52f5b 20015->20017 20019 2c5a440 69 API calls 20016->20019 20018 2c60a50 Mailbox 68 API calls 20017->20018 20022 2c52a36 20018->20022 20020 2c52f9e 20019->20020 20021 2c60a50 Mailbox 68 API calls 20020->20021 20020->20022 20021->20022 20022->19995 20024 2c5304d WSASetLastError select 20023->20024 20025 2c5303b 20023->20025 20027 2c5a440 69 API calls 20024->20027 20026 2c60a50 Mailbox 68 API calls 20025->20026 20030 2c52b59 20026->20030 20028 2c53095 20027->20028 20029 2c60a50 Mailbox 68 API calls 20028->20029 20028->20030 20029->20030 20030->19959 20031 2c52fb4 20030->20031 20032 2c52fd5 WSASetLastError getsockopt 20031->20032 20033 2c52fc0 20031->20033 20035 2c5a440 69 API calls 20032->20035 20034 2c60a50 Mailbox 68 API calls 20033->20034 20037 2c52b7a 20034->20037 20036 2c5300f 20035->20036 20036->20037 20038 2c60a50 Mailbox 68 API calls 20036->20038 20037->19959 20037->19962 20038->20037 20046 2c75330 20039->20046 20041 2c532b5 RtlEnterCriticalSection 20042 2c60a50 Mailbox 68 API calls 20041->20042 20043 2c532d6 20042->20043 20047 2c53307 20043->20047 20046->20041 20049 2c53311 __EH_prolog 20047->20049 20050 2c53350 20049->20050 20059 2c57db9 20049->20059 20063 2c5239d 20050->20063 20053 2c53390 20069 2c57d62 20053->20069 20055 2c60a50 Mailbox 68 API calls 20057 2c5337c 20055->20057 20058 2c52d39 71 API calls 20057->20058 20058->20053 20060 2c57dc7 20059->20060 20062 2c57e3d 20060->20062 20073 2c5891e 20060->20073 20062->20049 20065 2c523ab 20063->20065 20064 2c52417 20064->20053 20064->20055 20065->20064 20066 2c523c1 PostQueuedCompletionStatus 20065->20066 20068 2c523f8 InterlockedExchange RtlLeaveCriticalSection 20065->20068 20066->20065 20067 2c523da RtlEnterCriticalSection 20066->20067 20067->20065 20068->20065 20071 2c57d67 20069->20071 20070 2c532ee RtlLeaveCriticalSection 20070->19333 20071->20070 20089 2c51e7f 20071->20089 20074 2c58948 20073->20074 20075 2c57d62 68 API calls 20074->20075 20076 2c5898e 20075->20076 20077 2c589b5 20076->20077 20079 2c5a1ab 20076->20079 20077->20062 20080 2c5a1b5 20079->20080 20081 2c5a1c5 20079->20081 20080->20081 20084 2c5fa69 20080->20084 20081->20077 20085 2c62413 std::exception::exception 59 API calls 20084->20085 20086 2c5fa81 20085->20086 20087 2c6449a __CxxThrowException@8 RaiseException 20086->20087 20088 2c5fa96 20087->20088 20090 2c60a50 Mailbox 68 API calls 20089->20090 20091 2c51e90 20090->20091 20091->20071 20093 2c621bb _LocaleUpdate::_LocaleUpdate 59 API calls 20092->20093 20094 2c622d7 20093->20094 20095 2c622e5 20094->20095 20101 2c622fc 20094->20101 20096 2c65d9b __controlfp_s 59 API calls 20095->20096 20097 2c622ea 20096->20097 20098 2c64e35 __controlfp_s 9 API calls 20097->20098 20099 2c622f5 ___ascii_stricmp 20098->20099 20099->19344 20100 2c658ba 66 API calls __tolower_l 20100->20101 20101->20099 20101->20100 20103 2c627cb 20102->20103 20104 2c65d9b __controlfp_s 59 API calls 20103->20104 20107 2c627db _strlen 20103->20107 20105 2c627d0 20104->20105 20106 2c64e35 __controlfp_s 9 API calls 20105->20106 20106->20107 20107->19350 20109 2c5df41 __EH_prolog 20108->20109 20110 2c63a8f _Allocate 60 API calls 20109->20110 20111 2c5df58 20110->20111 20111->19369 20113 2c5a649 GetProcessHeap HeapFree 20112->20113 20113->19376 20135 2c69d71 20114->20135 20116 2c65e4f 20117 2c65e71 20116->20117 20118 2c65e5a 20116->20118 20120 2c65e76 20117->20120 20128 2c65e83 __flsbuf 20117->20128 20119 2c65d9b __controlfp_s 59 API calls 20118->20119 20122 2c65e5f 20119->20122 20121 2c65d9b __controlfp_s 59 API calls 20120->20121 20121->20122 20122->19385 20123 2c65ee7 20125 2c65f01 20123->20125 20130 2c65f18 20123->20130 20124 2c65f61 20126 2c69d95 __write 79 API calls 20124->20126 20154 2c69d95 20125->20154 20126->20122 20128->20122 20131 2c65ed2 20128->20131 20134 2c65edd 20128->20134 20142 2c6f6e2 20128->20142 20130->20122 20182 2c6f736 20130->20182 20131->20134 20151 2c6f8a5 20131->20151 20134->20123 20134->20124 20136 2c69d90 20135->20136 20137 2c69d7b 20135->20137 20136->20116 20138 2c65d9b __controlfp_s 59 API calls 20137->20138 20139 2c69d80 20138->20139 20140 2c64e35 __controlfp_s 9 API calls 20139->20140 20141 2c69d8b 20140->20141 20141->20116 20143 2c6f6ed 20142->20143 20144 2c6f6fa 20142->20144 20145 2c65d9b __controlfp_s 59 API calls 20143->20145 20146 2c6f706 20144->20146 20147 2c65d9b __controlfp_s 59 API calls 20144->20147 20148 2c6f6f2 20145->20148 20146->20131 20149 2c6f727 20147->20149 20148->20131 20150 2c64e35 __controlfp_s 9 API calls 20149->20150 20150->20148 20152 2c689f4 __malloc_crt 59 API calls 20151->20152 20153 2c6f8ba 20152->20153 20153->20134 20155 2c69da1 ___BuildCatchObject 20154->20155 20156 2c69dc5 20155->20156 20157 2c69dae 20155->20157 20159 2c69e64 20156->20159 20162 2c69dd9 20156->20162 20158 2c65d67 __close 59 API calls 20157->20158 20161 2c69db3 20158->20161 20160 2c65d67 __close 59 API calls 20159->20160 20163 2c69dfc 20160->20163 20164 2c65d9b __controlfp_s 59 API calls 20161->20164 20165 2c69df7 20162->20165 20166 2c69e01 20162->20166 20169 2c65d9b __controlfp_s 59 API calls 20163->20169 20177 2c69dba ___BuildCatchObject 20164->20177 20167 2c65d67 __close 59 API calls 20165->20167 20207 2c70bc7 20166->20207 20167->20163 20171 2c69e70 20169->20171 20170 2c69e07 20172 2c69e2d 20170->20172 20173 2c69e1a 20170->20173 20174 2c64e35 __controlfp_s 9 API calls 20171->20174 20176 2c65d9b __controlfp_s 59 API calls 20172->20176 20216 2c69e84 20173->20216 20174->20177 20179 2c69e32 20176->20179 20177->20122 20178 2c69e26 20275 2c69e5c 20178->20275 20180 2c65d67 __close 59 API calls 20179->20180 20180->20178 20183 2c6f742 ___BuildCatchObject 20182->20183 20184 2c6f753 20183->20184 20185 2c6f76b 20183->20185 20186 2c65d67 __close 59 API calls 20184->20186 20187 2c6f810 20185->20187 20190 2c6f7a0 20185->20190 20188 2c6f758 20186->20188 20189 2c65d67 __close 59 API calls 20187->20189 20192 2c65d9b __controlfp_s 59 API calls 20188->20192 20191 2c6f815 20189->20191 20193 2c70bc7 ___lock_fhandle 60 API calls 20190->20193 20194 2c65d9b __controlfp_s 59 API calls 20191->20194 20195 2c6f760 ___BuildCatchObject 20192->20195 20196 2c6f7a6 20193->20196 20197 2c6f81d 20194->20197 20195->20122 20198 2c6f7d4 20196->20198 20199 2c6f7bc 20196->20199 20200 2c64e35 __controlfp_s 9 API calls 20197->20200 20202 2c65d9b __controlfp_s 59 API calls 20198->20202 20201 2c6f832 __lseeki64_nolock 61 API calls 20199->20201 20200->20195 20203 2c6f7cb 20201->20203 20204 2c6f7d9 20202->20204 20311 2c6f808 20203->20311 20205 2c65d67 __close 59 API calls 20204->20205 20205->20203 20208 2c70bd3 ___BuildCatchObject 20207->20208 20209 2c70c22 RtlEnterCriticalSection 20208->20209 20210 2c6882d __lock 59 API calls 20208->20210 20211 2c70c48 ___BuildCatchObject 20209->20211 20212 2c70bf8 20210->20212 20211->20170 20213 2c70c10 20212->20213 20214 2c6914c __ioinit InitializeCriticalSectionAndSpinCount 20212->20214 20278 2c70c4c 20213->20278 20214->20213 20217 2c69e91 __write_nolock 20216->20217 20218 2c69ed0 20217->20218 20219 2c69eef 20217->20219 20250 2c69ec5 20217->20250 20221 2c65d67 __close 59 API calls 20218->20221 20224 2c69f47 20219->20224 20225 2c69f2b 20219->20225 20220 2c6448b __NMSG_WRITE 6 API calls 20222 2c6a6e5 20220->20222 20223 2c69ed5 20221->20223 20222->20178 20227 2c65d9b __controlfp_s 59 API calls 20223->20227 20228 2c69f60 20224->20228 20282 2c6f832 20224->20282 20226 2c65d67 __close 59 API calls 20225->20226 20229 2c69f30 20226->20229 20230 2c69edc 20227->20230 20232 2c6f6e2 __read_nolock 59 API calls 20228->20232 20233 2c65d9b __controlfp_s 59 API calls 20229->20233 20234 2c64e35 __controlfp_s 9 API calls 20230->20234 20235 2c69f6e 20232->20235 20236 2c69f37 20233->20236 20234->20250 20237 2c6a2c7 20235->20237 20241 2c65b9a ___InternalCxxFrameHandler 59 API calls 20235->20241 20240 2c64e35 __controlfp_s 9 API calls 20236->20240 20238 2c6a2e5 20237->20238 20239 2c6a65a WriteFile 20237->20239 20242 2c6a409 20238->20242 20248 2c6a2fb 20238->20248 20243 2c6a2ba GetLastError 20239->20243 20252 2c6a287 20239->20252 20240->20250 20244 2c69f9a GetConsoleMode 20241->20244 20253 2c6a414 20242->20253 20267 2c6a4fe 20242->20267 20243->20252 20244->20237 20246 2c69fd9 20244->20246 20245 2c6a693 20245->20250 20251 2c65d9b __controlfp_s 59 API calls 20245->20251 20246->20237 20247 2c69fe9 GetConsoleCP 20246->20247 20247->20245 20271 2c6a018 20247->20271 20248->20245 20249 2c6a36a WriteFile 20248->20249 20248->20252 20249->20243 20249->20248 20250->20220 20254 2c6a6c1 20251->20254 20252->20245 20252->20250 20255 2c6a3e7 20252->20255 20253->20245 20253->20252 20259 2c6a479 WriteFile 20253->20259 20260 2c65d67 __close 59 API calls 20254->20260 20256 2c6a3f2 20255->20256 20257 2c6a68a 20255->20257 20261 2c65d9b __controlfp_s 59 API calls 20256->20261 20262 2c65d7a __dosmaperr 59 API calls 20257->20262 20258 2c6a573 WideCharToMultiByte 20258->20243 20258->20267 20259->20243 20259->20253 20260->20250 20263 2c6a3f7 20261->20263 20262->20250 20265 2c65d67 __close 59 API calls 20263->20265 20264 2c6a5c2 WriteFile 20264->20267 20268 2c6a615 GetLastError 20264->20268 20265->20250 20267->20245 20267->20252 20267->20258 20267->20264 20268->20267 20269 2c6ff4a 61 API calls __write_nolock 20269->20271 20270 2c70f93 WriteConsoleW CreateFileW __putwch_nolock 20270->20271 20271->20243 20271->20252 20271->20269 20271->20270 20272 2c6a101 WideCharToMultiByte 20271->20272 20274 2c6a196 WriteFile 20271->20274 20291 2c6dc88 20271->20291 20272->20252 20273 2c6a13c WriteFile 20272->20273 20273->20243 20273->20271 20274->20243 20274->20271 20310 2c70f6d RtlLeaveCriticalSection 20275->20310 20277 2c69e62 20277->20177 20281 2c68997 RtlLeaveCriticalSection 20278->20281 20280 2c70c53 20280->20209 20281->20280 20294 2c70e84 20282->20294 20284 2c6f842 20285 2c6f84a 20284->20285 20286 2c6f85b SetFilePointerEx 20284->20286 20287 2c65d9b __controlfp_s 59 API calls 20285->20287 20288 2c6f873 GetLastError 20286->20288 20289 2c6f84f 20286->20289 20287->20289 20290 2c65d7a __dosmaperr 59 API calls 20288->20290 20289->20228 20290->20289 20307 2c6dc4e 20291->20307 20295 2c70ea4 20294->20295 20296 2c70e8f 20294->20296 20298 2c65d67 __close 59 API calls 20295->20298 20302 2c70ec9 20295->20302 20297 2c65d67 __close 59 API calls 20296->20297 20299 2c70e94 20297->20299 20300 2c70ed3 20298->20300 20301 2c65d9b __controlfp_s 59 API calls 20299->20301 20303 2c65d9b __controlfp_s 59 API calls 20300->20303 20304 2c70e9c 20301->20304 20302->20284 20305 2c70edb 20303->20305 20304->20284 20306 2c64e35 __controlfp_s 9 API calls 20305->20306 20306->20304 20308 2c621bb _LocaleUpdate::_LocaleUpdate 59 API calls 20307->20308 20309 2c6dc5f 20308->20309 20309->20271 20310->20277 20314 2c70f6d RtlLeaveCriticalSection 20311->20314 20313 2c6f80e 20313->20195 20314->20313 20315->19389 20317 2c5e271 __EH_prolog 20316->20317 20318 2c63a8f _Allocate 60 API calls 20317->20318 20319 2c5e27a 20318->20319 20320 2c51bfa RtlEnterCriticalSection 20319->20320 20322 2c5e488 20319->20322 20320->19394 20323 2c5e492 __EH_prolog 20322->20323 20326 2c526db RtlEnterCriticalSection 20323->20326 20325 2c5e4e8 20325->20320 20327 2c52728 CreateWaitableTimerA 20326->20327 20331 2c5277e 20326->20331 20328 2c52738 GetLastError 20327->20328 20329 2c5275b SetWaitableTimer 20327->20329 20332 2c60a50 Mailbox 68 API calls 20328->20332 20329->20331 20330 2c527d5 RtlLeaveCriticalSection 20330->20325 20331->20330 20333 2c63a8f _Allocate 60 API calls 20331->20333 20334 2c52745 20332->20334 20335 2c5278a 20333->20335 20370 2c51712 20334->20370 20337 2c63a8f _Allocate 60 API calls 20335->20337 20341 2c527c8 20335->20341 20339 2c527a9 20337->20339 20342 2c51cf8 CreateEventA 20339->20342 20376 2c57d3a 20341->20376 20343 2c51d23 GetLastError 20342->20343 20344 2c51d52 CreateEventA 20342->20344 20346 2c51d33 20343->20346 20345 2c51d6b GetLastError 20344->20345 20364 2c51d96 20344->20364 20350 2c51d7b 20345->20350 20349 2c60a50 Mailbox 68 API calls 20346->20349 20347 2c632fc __beginthreadex 201 API calls 20348 2c51db6 20347->20348 20351 2c51dc6 GetLastError 20348->20351 20352 2c51e0d 20348->20352 20353 2c51d3c 20349->20353 20354 2c60a50 Mailbox 68 API calls 20350->20354 20359 2c51dd8 20351->20359 20357 2c51e11 WaitForSingleObject CloseHandle 20352->20357 20358 2c51e1d 20352->20358 20355 2c51712 60 API calls 20353->20355 20356 2c51d84 20354->20356 20360 2c51d4e 20355->20360 20361 2c51712 60 API calls 20356->20361 20357->20358 20358->20341 20362 2c51ddc CloseHandle 20359->20362 20363 2c51ddf 20359->20363 20360->20344 20361->20364 20362->20363 20365 2c51dee 20363->20365 20366 2c51de9 CloseHandle 20363->20366 20364->20347 20367 2c60a50 Mailbox 68 API calls 20365->20367 20366->20365 20368 2c51dfb 20367->20368 20369 2c51712 60 API calls 20368->20369 20369->20352 20371 2c5171c __EH_prolog 20370->20371 20372 2c5173e 20371->20372 20373 2c51815 Mailbox 59 API calls 20371->20373 20372->20329 20374 2c51732 20373->20374 20379 2c5a3d9 20374->20379 20377 2c57d56 20376->20377 20378 2c57d47 CloseHandle 20376->20378 20377->20330 20378->20377 20380 2c5a3e3 __EH_prolog 20379->20380 20387 2c5c93e 20380->20387 20384 2c5a404 20385 2c6449a __CxxThrowException@8 RaiseException 20384->20385 20386 2c5a412 20385->20386 20388 2c5b165 std::bad_exception::bad_exception 60 API calls 20387->20388 20389 2c5a3f6 20388->20389 20390 2c5c97a 20389->20390 20391 2c5c984 __EH_prolog 20390->20391 20394 2c5b114 20391->20394 20393 2c5c9b3 Mailbox 20393->20384 20395 2c5b11e __EH_prolog 20394->20395 20396 2c5b165 std::bad_exception::bad_exception 60 API calls 20395->20396 20397 2c5b12f Mailbox 20396->20397 20397->20393 20409 2c530ae WSASetLastError 20398->20409 20401 2c530ae 71 API calls 20402 2c53c90 20401->20402 20403 2c516ae 20402->20403 20404 2c516b8 __EH_prolog 20403->20404 20405 2c51701 20404->20405 20406 2c62413 std::exception::exception 59 API calls 20404->20406 20405->19262 20407 2c516dc 20406->20407 20408 2c5a3d9 60 API calls 20407->20408 20408->20405 20410 2c530ec WSAStringToAddressA 20409->20410 20411 2c530ce 20409->20411 20413 2c5a440 69 API calls 20410->20413 20411->20410 20412 2c530d3 20411->20412 20414 2c60a50 Mailbox 68 API calls 20412->20414 20415 2c53114 20413->20415 20424 2c530d8 20414->20424 20416 2c53154 20415->20416 20422 2c5311e _memcmp 20415->20422 20417 2c53135 20416->20417 20419 2c60a50 Mailbox 68 API calls 20416->20419 20418 2c53193 20417->20418 20420 2c60a50 Mailbox 68 API calls 20417->20420 20423 2c60a50 Mailbox 68 API calls 20418->20423 20418->20424 20419->20417 20420->20418 20421 2c60a50 Mailbox 68 API calls 20421->20417 20422->20417 20422->20421 20423->20424 20424->20401 20424->20402 20426 2c53bdd __EH_prolog 20425->20426 20427 2c53bfe htonl htonl 20426->20427 20437 2c623f7 20426->20437 20427->19409 20432 2c53c20 __EH_prolog 20431->20432 20433 2c53c41 20432->20433 20434 2c623f7 std::bad_exception::bad_exception 59 API calls 20432->20434 20433->19409 20435 2c53c35 20434->20435 20436 2c5a58e 60 API calls 20435->20436 20436->20433 20438 2c62413 std::exception::exception 59 API calls 20437->20438 20439 2c53bf2 20438->20439 20440 2c5a58e 20439->20440 20441 2c5a598 __EH_prolog 20440->20441 20448 2c5cab1 20441->20448 20445 2c5a5b3 20446 2c6449a __CxxThrowException@8 RaiseException 20445->20446 20447 2c5a5c1 20446->20447 20455 2c623dc 20448->20455 20451 2c5caed 20452 2c5caf7 __EH_prolog 20451->20452 20458 2c5b483 20452->20458 20454 2c5cb26 Mailbox 20454->20445 20456 2c62453 std::exception::exception 59 API calls 20455->20456 20457 2c5a5a5 20456->20457 20457->20451 20459 2c5b48d __EH_prolog 20458->20459 20460 2c623dc std::bad_exception::bad_exception 59 API calls 20459->20460 20461 2c5b49e Mailbox 20460->20461 20461->20454 20463 2c53755 InterlockedCompareExchange 20462->20463 20464 2c53770 20462->20464 20463->20464 20466 2c53765 20463->20466 20465 2c60a50 Mailbox 68 API calls 20464->20465 20467 2c53779 20465->20467 20468 2c532ab 78 API calls 20466->20468 20469 2c529ee 76 API calls 20467->20469 20468->20464 20470 2c5378e 20469->20470 20470->19413 20500 2c635f0 20471->20500 20473 2c553c8 20473->19423 20474 2c63849 20473->20474 20475 2c63855 ___BuildCatchObject 20474->20475 20476 2c63873 20475->20476 20477 2c6388b 20475->20477 20486 2c63883 ___BuildCatchObject 20475->20486 20478 2c65d9b __controlfp_s 59 API calls 20476->20478 20642 2c69732 20477->20642 20480 2c63878 20478->20480 20483 2c64e35 __controlfp_s 9 API calls 20480->20483 20483->20486 20486->19425 20488 2c639d3 ___BuildCatchObject 20487->20488 20489 2c639e7 20488->20489 20490 2c639ff 20488->20490 20491 2c65d9b __controlfp_s 59 API calls 20489->20491 20492 2c69732 __lock_file 60 API calls 20490->20492 20499 2c639f7 ___BuildCatchObject 20490->20499 20493 2c639ec 20491->20493 20494 2c63a11 20492->20494 20495 2c64e35 __controlfp_s 9 API calls 20493->20495 20669 2c6395b 20494->20669 20495->20499 20499->19423 20501 2c635fc ___BuildCatchObject 20500->20501 20502 2c6360e 20501->20502 20505 2c6363b 20501->20505 20503 2c65d9b __controlfp_s 59 API calls 20502->20503 20504 2c63613 20503->20504 20506 2c64e35 __controlfp_s 9 API calls 20504->20506 20519 2c69808 20505->20519 20516 2c6361e ___BuildCatchObject @_EH4_CallFilterFunc@8 20506->20516 20508 2c63640 20509 2c63656 20508->20509 20510 2c63649 20508->20510 20512 2c6367f 20509->20512 20513 2c6365f 20509->20513 20511 2c65d9b __controlfp_s 59 API calls 20510->20511 20511->20516 20534 2c69927 20512->20534 20514 2c65d9b __controlfp_s 59 API calls 20513->20514 20514->20516 20516->20473 20520 2c69814 ___BuildCatchObject 20519->20520 20521 2c6882d __lock 59 API calls 20520->20521 20527 2c69822 20521->20527 20522 2c6989d 20524 2c689f4 __malloc_crt 59 API calls 20522->20524 20526 2c698a4 20524->20526 20525 2c69913 ___BuildCatchObject 20525->20508 20528 2c6914c __ioinit InitializeCriticalSectionAndSpinCount 20526->20528 20532 2c69896 20526->20532 20527->20522 20529 2c688b5 __mtinitlocknum 59 API calls 20527->20529 20527->20532 20554 2c69771 20527->20554 20559 2c697db 20527->20559 20531 2c698ca RtlEnterCriticalSection 20528->20531 20529->20527 20531->20532 20564 2c6991e 20532->20564 20542 2c69944 20534->20542 20535 2c69958 20536 2c65d9b __controlfp_s 59 API calls 20535->20536 20537 2c6995d 20536->20537 20539 2c64e35 __controlfp_s 9 API calls 20537->20539 20538 2c69b5b 20575 2c70770 20538->20575 20541 2c6368a 20539->20541 20551 2c636ac 20541->20551 20542->20535 20550 2c69aff 20542->20550 20569 2c7078e 20542->20569 20547 2c708bd __openfile 59 API calls 20548 2c69b17 20547->20548 20549 2c708bd __openfile 59 API calls 20548->20549 20548->20550 20549->20550 20550->20535 20550->20538 20635 2c697a1 20551->20635 20553 2c636b2 20553->20516 20555 2c69792 RtlEnterCriticalSection 20554->20555 20556 2c6977c 20554->20556 20555->20527 20557 2c6882d __lock 59 API calls 20556->20557 20558 2c69785 20557->20558 20558->20527 20560 2c697fc RtlLeaveCriticalSection 20559->20560 20561 2c697e9 20559->20561 20560->20527 20567 2c68997 RtlLeaveCriticalSection 20561->20567 20563 2c697f9 20563->20527 20568 2c68997 RtlLeaveCriticalSection 20564->20568 20566 2c69925 20566->20525 20567->20563 20568->20566 20578 2c707a6 20569->20578 20571 2c69ac5 20571->20535 20572 2c708bd 20571->20572 20586 2c708d5 20572->20586 20574 2c69af8 20574->20547 20574->20550 20593 2c70659 20575->20593 20577 2c70789 20577->20541 20579 2c707bb 20578->20579 20585 2c707b4 20578->20585 20580 2c621bb _LocaleUpdate::_LocaleUpdate 59 API calls 20579->20580 20581 2c707c8 20580->20581 20582 2c65d9b __controlfp_s 59 API calls 20581->20582 20581->20585 20583 2c707fb 20582->20583 20584 2c64e35 __controlfp_s 9 API calls 20583->20584 20584->20585 20585->20571 20587 2c621bb _LocaleUpdate::_LocaleUpdate 59 API calls 20586->20587 20588 2c708e8 20587->20588 20589 2c65d9b __controlfp_s 59 API calls 20588->20589 20592 2c708fd 20588->20592 20590 2c70929 20589->20590 20591 2c64e35 __controlfp_s 9 API calls 20590->20591 20591->20592 20592->20574 20596 2c70665 ___BuildCatchObject 20593->20596 20594 2c7067b 20595 2c65d9b __controlfp_s 59 API calls 20594->20595 20597 2c70680 20595->20597 20596->20594 20598 2c706b1 20596->20598 20599 2c64e35 __controlfp_s 9 API calls 20597->20599 20604 2c70722 20598->20604 20601 2c7068a ___BuildCatchObject 20599->20601 20601->20577 20613 2c68176 20604->20613 20606 2c70736 20607 2c706cd 20606->20607 20608 2c62eb4 _free 59 API calls 20606->20608 20609 2c706f6 20607->20609 20608->20607 20610 2c70720 20609->20610 20611 2c706fc 20609->20611 20610->20601 20634 2c70f6d RtlLeaveCriticalSection 20611->20634 20614 2c68183 20613->20614 20615 2c68199 20613->20615 20617 2c65d9b __controlfp_s 59 API calls 20614->20617 20615->20614 20616 2c681a0 ___crtIsPackagedApp 20615->20616 20620 2c681b6 MultiByteToWideChar 20616->20620 20621 2c681a9 AreFileApisANSI 20616->20621 20618 2c68188 20617->20618 20619 2c64e35 __controlfp_s 9 API calls 20618->20619 20633 2c68192 20619->20633 20623 2c681d0 GetLastError 20620->20623 20624 2c681e1 20620->20624 20621->20620 20622 2c681b3 20621->20622 20622->20620 20625 2c65d7a __dosmaperr 59 API calls 20623->20625 20626 2c689f4 __malloc_crt 59 API calls 20624->20626 20625->20633 20627 2c681e9 20626->20627 20628 2c681f0 MultiByteToWideChar 20627->20628 20627->20633 20629 2c68206 GetLastError 20628->20629 20628->20633 20630 2c65d7a __dosmaperr 59 API calls 20629->20630 20631 2c68212 20630->20631 20632 2c62eb4 _free 59 API calls 20631->20632 20632->20633 20633->20606 20634->20610 20636 2c697b0 20635->20636 20637 2c697cf RtlLeaveCriticalSection 20635->20637 20636->20637 20638 2c697b7 20636->20638 20637->20553 20641 2c68997 RtlLeaveCriticalSection 20638->20641 20640 2c697cc 20640->20553 20641->20640 20643 2c69764 RtlEnterCriticalSection 20642->20643 20644 2c69742 20642->20644 20646 2c63891 20643->20646 20644->20643 20645 2c6974a 20644->20645 20647 2c6882d __lock 59 API calls 20645->20647 20648 2c636f0 20646->20648 20647->20646 20650 2c636ff 20648->20650 20655 2c6371d 20648->20655 20649 2c6370d 20651 2c65d9b __controlfp_s 59 API calls 20649->20651 20650->20649 20650->20655 20658 2c63737 _memmove 20650->20658 20652 2c63712 20651->20652 20653 2c64e35 __controlfp_s 9 API calls 20652->20653 20653->20655 20654 2c65e41 __flsbuf 79 API calls 20654->20658 20660 2c638c3 20655->20660 20657 2c69d71 __fflush_nolock 59 API calls 20657->20658 20658->20654 20658->20655 20658->20657 20659 2c69d95 __write 79 API calls 20658->20659 20663 2c6a72f 20658->20663 20659->20658 20661 2c697a1 __fsopen 2 API calls 20660->20661 20662 2c638c9 20661->20662 20662->20486 20664 2c6a766 20663->20664 20665 2c6a742 20663->20665 20664->20658 20665->20664 20666 2c69d71 __fflush_nolock 59 API calls 20665->20666 20667 2c6a75f 20666->20667 20668 2c69d95 __write 79 API calls 20667->20668 20668->20664 20670 2c6397e 20669->20670 20671 2c6396a 20669->20671 20673 2c6a72f __flush 79 API calls 20670->20673 20678 2c6397a 20670->20678 20672 2c65d9b __controlfp_s 59 API calls 20671->20672 20674 2c6396f 20672->20674 20675 2c6398a 20673->20675 20676 2c64e35 __controlfp_s 9 API calls 20674->20676 20688 2c6b1db 20675->20688 20676->20678 20685 2c63a36 20678->20685 20680 2c69d71 __fflush_nolock 59 API calls 20681 2c63998 20680->20681 20692 2c6b066 20681->20692 20683 2c6399e 20683->20678 20684 2c62eb4 _free 59 API calls 20683->20684 20684->20678 20686 2c697a1 __fsopen 2 API calls 20685->20686 20687 2c63a3c 20686->20687 20687->20499 20689 2c63992 20688->20689 20690 2c6b1e8 20688->20690 20689->20680 20690->20689 20691 2c62eb4 _free 59 API calls 20690->20691 20691->20689 20693 2c6b072 ___BuildCatchObject 20692->20693 20694 2c6b096 20693->20694 20695 2c6b07f 20693->20695 20697 2c6b121 20694->20697 20699 2c6b0a6 20694->20699 20696 2c65d67 __close 59 API calls 20695->20696 20698 2c6b084 20696->20698 20700 2c65d67 __close 59 API calls 20697->20700 20701 2c65d9b __controlfp_s 59 API calls 20698->20701 20702 2c6b0c4 20699->20702 20703 2c6b0ce 20699->20703 20704 2c6b0c9 20700->20704 20713 2c6b08b ___BuildCatchObject 20701->20713 20705 2c65d67 __close 59 API calls 20702->20705 20706 2c70bc7 ___lock_fhandle 60 API calls 20703->20706 20707 2c65d9b __controlfp_s 59 API calls 20704->20707 20705->20704 20708 2c6b0d4 20706->20708 20711 2c6b12d 20707->20711 20709 2c6b0e7 20708->20709 20710 2c6b0f2 20708->20710 20718 2c6b141 20709->20718 20714 2c65d9b __controlfp_s 59 API calls 20710->20714 20715 2c64e35 __controlfp_s 9 API calls 20711->20715 20713->20683 20716 2c6b0ed 20714->20716 20715->20713 20733 2c6b119 20716->20733 20719 2c70e84 __lseeki64_nolock 59 API calls 20718->20719 20722 2c6b14f 20719->20722 20720 2c6b1a5 20736 2c70dfe 20720->20736 20722->20720 20723 2c70e84 __lseeki64_nolock 59 API calls 20722->20723 20732 2c6b183 20722->20732 20727 2c6b17a 20723->20727 20732->20720 20745 2c70f6d RtlLeaveCriticalSection 20733->20745 20746 2c9e1f8 20747 2cbb28a SHGetSpecialFolderPathA 20746->20747 20748 2cbb295 20747->20748 20749 40b531 20751 40b4ca 20749->20751 20750 40253c 20751->20750 20752 40b3df RegQueryValueExA 20751->20752 20753 402211 20752->20753 20753->20750 20754 40251d RegCloseKey 20753->20754 20754->20750 20755 40b0f2 20756 40b2b5 RegOpenKeyExA 20755->20756 20757 40b2c3 20756->20757 20758 402293 20759 402298 20758->20759 20760 40b061 CreateDirectoryA 20759->20760 20761 40ba65 20760->20761 20762 40b375 20763 4026c4 Sleep 20762->20763 20765 40b64b 20763->20765 20766 402315 20767 40231a 20766->20767 20767->20767 20768 402325 lstrcmpiW 20767->20768 20769 40b242 StartServiceCtrlDispatcherA 20768->20769 20771 402333 20768->20771 20769->20771 20771->20771 20772 40b257 CopyFileA 20773 40b051 20772->20773 20774 2c8f53f 20775 2cb021f 20774->20775 20778 2c62eec 59 API calls 20775->20778 20776 2ce620c 20777 2c62eec 59 API calls 20776->20777 20777->20776 20778->20776 20779 2c5f8de LoadLibraryA 20780 2c5f907 GetProcAddress 20779->20780 20781 2c5f9c1 20779->20781 20782 2c5f9ba FreeLibrary 20780->20782 20785 2c5f91b 20780->20785 20782->20781 20783 2c5f92d GetAdaptersInfo 20783->20785 20784 2c5f9b5 20784->20782 20785->20783 20785->20784 20786 2c63a8f _Allocate 60 API calls 20785->20786 20786->20785 20787 40279b 20788 4027b8 OpenSCManagerA 20787->20788 20789 4027c9 20788->20789 20790 40b29c 20793 40212f 20790->20793 20794 40b781 VirtualAlloc 20793->20794 20795 4025fd 20796 4026cf RegCreateKeyExA 20795->20796 20798 4026de RegSetValueExA 20799 4027a1 RegCloseKey 20798->20799 20800 4027a7 SetEvent 20799->20800 20802 4022cb 20800->20802 20803 40b7d1 ExitProcess 20802->20803 20804 40b873 StartServiceCtrlDispatcherA 20803->20804 20805 40ba1e 20804->20805 20806 2c5f7da CreateFileA 20807 2c5f8d6 20806->20807 20810 2c5f80b 20806->20810 20808 2c5f823 DeviceIoControl 20808->20810 20809 2c5f8cc CloseHandle 20809->20807 20810->20808 20810->20809 20811 2c5f898 GetLastError 20810->20811 20812 2c63a8f _Allocate 60 API calls 20810->20812 20811->20809 20811->20810 20812->20810 20813 4021bf GetCommandLineW CommandLineToArgvW GetLocalTime 20820 401f27 20813->20820 20816 4021f2 StartServiceCtrlDispatcherA 20819 402333 20816->20819 20817 402325 lstrcmpiW 20817->20816 20817->20819 20821 401f3c 20820->20821 20824 401a1d 20821->20824 20823 401f45 20823->20816 20823->20817 20825 401a2c 20824->20825 20830 401a4f CreateFileA 20825->20830 20829 401a3e 20829->20823 20831 401a35 20830->20831 20832 401a7d 20830->20832 20838 401b4b LoadLibraryA 20831->20838 20833 401a98 DeviceIoControl 20832->20833 20835 401b3a CloseHandle 20832->20835 20836 401b0e GetLastError 20832->20836 20847 402ba6 20832->20847 20850 402b98 20832->20850 20833->20832 20835->20831 20836->20832 20836->20835 20839 401c21 20838->20839 20840 401b6e GetProcAddress 20838->20840 20839->20829 20841 401b85 20840->20841 20842 401c18 FreeLibrary 20840->20842 20843 401b95 GetAdaptersInfo 20841->20843 20844 402ba6 7 API calls 20841->20844 20845 401c15 20841->20845 20846 402b98 12 API calls 20841->20846 20842->20839 20843->20841 20844->20841 20845->20842 20846->20841 20848 402f51 7 API calls 20847->20848 20849 402baf 20848->20849 20849->20832 20851 402eb1 12 API calls 20850->20851 20852 402ba3 20851->20852 20852->20832

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 2c572ab-2c572c3 InternetOpenA 1 2c57389-2c5738f 0->1 2 2c572c9-2c5731d InternetSetOptionA * 3 call 2c64a30 0->2 4 2c57391-2c57397 1->4 5 2c573ab-2c573b9 1->5 8 2c57322-2c57340 InternetOpenUrlA 2->8 9 2c5739d-2c573aa call 2c553ec 4->9 10 2c57399-2c5739b 4->10 6 2c566f4-2c566f6 5->6 7 2c573bf-2c573e3 call 2c64a30 call 2c5439c 5->7 12 2c566ff-2c56701 6->12 13 2c566f8-2c566fd 6->13 7->6 30 2c573e9-2c57417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c6227c 7->30 14 2c57382-2c57383 InternetCloseHandle 8->14 15 2c57342 8->15 9->5 10->5 18 2c56703 12->18 19 2c5670e-2c56742 RtlEnterCriticalSection RtlLeaveCriticalSection 12->19 20 2c56708 Sleep 13->20 14->1 21 2c57346-2c5736c InternetReadFile 15->21 18->20 28 2c56744-2c56750 19->28 29 2c56792 19->29 20->19 25 2c57377-2c5737e InternetCloseHandle 21->25 26 2c5736e-2c57375 21->26 25->14 26->21 28->29 31 2c56752-2c5675f 28->31 32 2c56796 29->32 38 2c5746d-2c57488 call 2c6227c 30->38 39 2c57419-2c5742b call 2c6227c 30->39 34 2c56767-2c56768 31->34 35 2c56761-2c56765 31->35 32->0 37 2c5676c-2c56790 call 2c64a30 * 2 34->37 35->37 37->32 47 2c57742-2c57754 call 2c6227c 38->47 48 2c5748e-2c57490 38->48 39->38 49 2c5742d-2c5743f call 2c6227c 39->49 57 2c57756-2c57758 47->57 58 2c5779d-2c577a6 call 2c6227c 47->58 48->47 52 2c57496-2c57548 call 2c62eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2c64a30 * 5 call 2c5439c * 2 48->52 49->38 60 2c57441-2c57453 call 2c6227c 49->60 115 2c57585 52->115 116 2c5754a-2c5754c 52->116 57->58 61 2c5775a-2c57798 call 2c64a30 RtlEnterCriticalSection RtlLeaveCriticalSection 57->61 65 2c577ab-2c577af 58->65 60->38 71 2c57455-2c57467 call 2c6227c 60->71 61->6 69 2c577b1-2c577bf call 2c561f5 call 2c56303 65->69 70 2c577d0-2c577e2 call 2c6227c 65->70 87 2c577c4-2c577cb call 2c5640e 69->87 84 2c57b00-2c57b12 call 2c6227c 70->84 85 2c577e8-2c577ea 70->85 71->6 71->38 84->6 96 2c57b18-2c57b46 call 2c62eec call 2c64a30 call 2c5439c 84->96 85->84 89 2c577f0-2c57807 call 2c5439c 85->89 87->6 89->6 100 2c5780d-2c578db call 2c62358 call 2c51ba7 89->100 118 2c57b4f-2c57b56 call 2c62eb4 96->118 119 2c57b48-2c57b4a call 2c5534d 96->119 113 2c578e2-2c57903 RtlEnterCriticalSection 100->113 114 2c578dd call 2c5143f 100->114 122 2c57905-2c5790c 113->122 123 2c5790f-2c57945 RtlLeaveCriticalSection call 2c53c67 call 2c53d7e 113->123 114->113 120 2c57589-2c575b7 call 2c62eec call 2c64a30 call 2c5439c 115->120 116->115 124 2c5754e-2c57560 call 2c6227c 116->124 118->6 119->118 145 2c575b9-2c575c8 call 2c63529 120->145 146 2c575f8-2c57601 call 2c62eb4 120->146 122->123 138 2c5794a-2c57967 call 2c58272 123->138 124->115 136 2c57562-2c57583 call 2c5439c 124->136 136->120 144 2c5796c-2c57973 138->144 147 2c57ae7-2c57afb call 2c58f3a 144->147 148 2c57979-2c579b3 call 2c5a65c 144->148 145->146 161 2c575ca 145->161 159 2c57607-2c5761f call 2c63a8f 146->159 160 2c57738-2c5773b 146->160 147->6 153 2c579b8-2c579c1 148->153 157 2c579c7-2c579ce 153->157 158 2c57ab1-2c57ae2 call 2c58321 call 2c533b2 153->158 163 2c579d1-2c579d6 157->163 158->147 172 2c57621-2c57629 call 2c5966e 159->172 173 2c5762b 159->173 160->47 165 2c575cf-2c575e1 call 2c62790 161->165 163->163 167 2c579d8-2c57a15 call 2c5a65c 163->167 178 2c575e6-2c575f6 call 2c63529 165->178 179 2c575e3 165->179 175 2c57a1a-2c57a23 167->175 177 2c5762d-2c57661 call 2c5a786 call 2c53863 172->177 173->177 175->158 181 2c57a29-2c57a2f 175->181 189 2c57666-2c57682 call 2c55119 177->189 178->146 178->165 179->178 185 2c57a32-2c57a37 181->185 185->185 188 2c57a39-2c57a74 call 2c5a65c 185->188 188->158 194 2c57a76-2c57aaa call 2c5d04e 188->194 193 2c57687-2c576b8 call 2c53863 call 2c5aa2c 189->193 200 2c576bd-2c576cf call 2c5ab46 193->200 198 2c57aaf-2c57ab0 194->198 198->158 202 2c576d4-2c576e5 200->202 203 2c576e7 call 2c5380b 202->203 204 2c576ec-2c576fb Sleep 202->204 203->204 206 2c57703-2c57717 call 2c61830 204->206 208 2c57723-2c57731 206->208 209 2c57719-2c57722 call 2c54100 206->209 208->160 211 2c57733 call 2c5380b 208->211 209->208 211->160
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(0000EA60), ref: 02C56708
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C56713
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C56724
                                                                                                                    • InternetOpenA.WININET(?), ref: 02C572B5
                                                                                                                    • InternetSetOptionA.WININET(00000000,00000002,?), ref: 02C572DD
                                                                                                                    • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 02C572F5
                                                                                                                    • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 02C5730D
                                                                                                                    • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200), ref: 02C57336
                                                                                                                    • InternetReadFile.WININET(00000000,?,00001000,?), ref: 02C57358
                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 02C57378
                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 02C57383
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C573EE
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C573FF
                                                                                                                    • _malloc.LIBCMT ref: 02C57498
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C574AA
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C574B6
                                                                                                                    • _malloc.LIBCMT ref: 02C5758E
                                                                                                                    • _strtok.LIBCMT ref: 02C575BF
                                                                                                                    • _swscanf.LIBCMT ref: 02C575D6
                                                                                                                    • _strtok.LIBCMT ref: 02C575ED
                                                                                                                    • _free.LIBCMT ref: 02C575F9
                                                                                                                    • Sleep.KERNEL32(000007D0), ref: 02C576F1
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C57772
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C57784
                                                                                                                    • _sprintf.LIBCMT ref: 02C57822
                                                                                                                    • RtlEnterCriticalSection.NTDLL(00000020), ref: 02C578E6
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C5791A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$Internet$EnterLeave$Option$CloseHandleOpenSleep_malloc_strtok$FileRead_free_sprintf_swscanf
                                                                                                                    • String ID: $%d;$<htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls$urls
                                                                                                                    • API String ID: 1657546717-1839899575
                                                                                                                    • Opcode ID: f1a6f1cbcc2bed41f97e5c4bd95924df5db9988051909f7d8c60cb0bdcfe8ac0
                                                                                                                    • Instruction ID: b38a7a0642899b9f21b9ddbf01a5d19d667f32925761cd913c5b0a3c0ba53966
                                                                                                                    • Opcode Fuzzy Hash: f1a6f1cbcc2bed41f97e5c4bd95924df5db9988051909f7d8c60cb0bdcfe8ac0
                                                                                                                    • Instruction Fuzzy Hash: E63214315483919FE734AB24DC44BABBBE6AFC5310F10092DF98997291EB70D588CB5B

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 214 2c5648b-2c566f1 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 2c542c7 GetTickCount call 2c5605a GetVersionExA call 2c64a30 call 2c62eec * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 2c64a30 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c62eec * 4 QueryPerformanceCounter Sleep call 2c62eec * 2 call 2c64a30 * 2 259 2c566f4-2c566f6 214->259 260 2c566ff-2c56701 259->260 261 2c566f8-2c566fd 259->261 262 2c56703 260->262 263 2c5670e-2c56742 RtlEnterCriticalSection RtlLeaveCriticalSection 260->263 264 2c56708 Sleep 261->264 262->264 266 2c56744-2c56750 263->266 267 2c56792 263->267 264->263 266->267 268 2c56752-2c5675f 266->268 269 2c56796-2c572c3 InternetOpenA 267->269 271 2c56767-2c56768 268->271 272 2c56761-2c56765 268->272 273 2c57389-2c5738f 269->273 274 2c572c9-2c57340 InternetSetOptionA * 3 call 2c64a30 InternetOpenUrlA 269->274 275 2c5676c-2c56790 call 2c64a30 * 2 271->275 272->275 277 2c57391-2c57397 273->277 278 2c573ab-2c573b9 273->278 286 2c57382-2c57383 InternetCloseHandle 274->286 287 2c57342 274->287 275->269 282 2c5739d-2c573aa call 2c553ec 277->282 283 2c57399-2c5739b 277->283 278->259 280 2c573bf-2c573e3 call 2c64a30 call 2c5439c 278->280 280->259 298 2c573e9-2c57417 RtlEnterCriticalSection RtlLeaveCriticalSection call 2c6227c 280->298 282->278 283->278 286->273 291 2c57346-2c5736c InternetReadFile 287->291 295 2c57377-2c5737e InternetCloseHandle 291->295 296 2c5736e-2c57375 291->296 295->286 296->291 301 2c5746d-2c57488 call 2c6227c 298->301 302 2c57419-2c5742b call 2c6227c 298->302 307 2c57742-2c57754 call 2c6227c 301->307 308 2c5748e-2c57490 301->308 302->301 309 2c5742d-2c5743f call 2c6227c 302->309 316 2c57756-2c57758 307->316 317 2c5779d-2c577af call 2c6227c 307->317 308->307 311 2c57496-2c57548 call 2c62eec RtlEnterCriticalSection RtlLeaveCriticalSection call 2c64a30 * 5 call 2c5439c * 2 308->311 309->301 319 2c57441-2c57453 call 2c6227c 309->319 374 2c57585 311->374 375 2c5754a-2c5754c 311->375 316->317 320 2c5775a-2c57798 call 2c64a30 RtlEnterCriticalSection RtlLeaveCriticalSection 316->320 328 2c577b1-2c577bf call 2c561f5 call 2c56303 317->328 329 2c577d0-2c577e2 call 2c6227c 317->329 319->301 330 2c57455-2c57467 call 2c6227c 319->330 320->259 346 2c577c4-2c577cb call 2c5640e 328->346 343 2c57b00-2c57b12 call 2c6227c 329->343 344 2c577e8-2c577ea 329->344 330->259 330->301 343->259 355 2c57b18-2c57b46 call 2c62eec call 2c64a30 call 2c5439c 343->355 344->343 348 2c577f0-2c57807 call 2c5439c 344->348 346->259 348->259 359 2c5780d-2c578db call 2c62358 call 2c51ba7 348->359 377 2c57b4f-2c57b56 call 2c62eb4 355->377 378 2c57b48-2c57b4a call 2c5534d 355->378 372 2c578e2-2c57903 RtlEnterCriticalSection 359->372 373 2c578dd call 2c5143f 359->373 381 2c57905-2c5790c 372->381 382 2c5790f-2c57973 RtlLeaveCriticalSection call 2c53c67 call 2c53d7e call 2c58272 372->382 373->372 379 2c57589-2c575b7 call 2c62eec call 2c64a30 call 2c5439c 374->379 375->374 383 2c5754e-2c57560 call 2c6227c 375->383 377->259 378->377 404 2c575b9-2c575c8 call 2c63529 379->404 405 2c575f8-2c57601 call 2c62eb4 379->405 381->382 406 2c57ae7-2c57afb call 2c58f3a 382->406 407 2c57979-2c579c1 call 2c5a65c 382->407 383->374 395 2c57562-2c57583 call 2c5439c 383->395 395->379 404->405 420 2c575ca 404->420 418 2c57607-2c5761f call 2c63a8f 405->418 419 2c57738-2c5773b 405->419 406->259 416 2c579c7-2c579ce 407->416 417 2c57ab1-2c57ae2 call 2c58321 call 2c533b2 407->417 422 2c579d1-2c579d6 416->422 417->406 431 2c57621-2c57629 call 2c5966e 418->431 432 2c5762b 418->432 419->307 424 2c575cf-2c575e1 call 2c62790 420->424 422->422 426 2c579d8-2c57a23 call 2c5a65c 422->426 437 2c575e6-2c575f6 call 2c63529 424->437 438 2c575e3 424->438 426->417 440 2c57a29-2c57a2f 426->440 436 2c5762d-2c576cf call 2c5a786 call 2c53863 call 2c55119 call 2c53863 call 2c5aa2c call 2c5ab46 431->436 432->436 461 2c576d4-2c576e5 436->461 437->405 437->424 438->437 444 2c57a32-2c57a37 440->444 444->444 447 2c57a39-2c57a74 call 2c5a65c 444->447 447->417 453 2c57a76-2c57aaa call 2c5d04e 447->453 457 2c57aaf-2c57ab0 453->457 457->417 462 2c576e7 call 2c5380b 461->462 463 2c576ec-2c57717 Sleep call 2c61830 461->463 462->463 467 2c57723-2c57731 463->467 468 2c57719-2c57722 call 2c54100 463->468 467->419 470 2c57733 call 2c5380b 467->470 468->467 470->419
                                                                                                                    APIs
                                                                                                                    • RtlInitializeCriticalSection.NTDLL(02C871B8), ref: 02C564BA
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 02C564D1
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02C564DA
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 02C564E9
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02C564EC
                                                                                                                    • GetTickCount.KERNEL32 ref: 02C564F8
                                                                                                                      • Part of subcall function 02C5605A: _malloc.LIBCMT ref: 02C56068
                                                                                                                    • GetVersionExA.KERNEL32(02C87010), ref: 02C56525
                                                                                                                    • _malloc.LIBCMT ref: 02C56551
                                                                                                                      • Part of subcall function 02C62EEC: __FF_MSGBANNER.LIBCMT ref: 02C62F03
                                                                                                                      • Part of subcall function 02C62EEC: __NMSG_WRITE.LIBCMT ref: 02C62F0A
                                                                                                                      • Part of subcall function 02C62EEC: RtlAllocateHeap.NTDLL(00A20000,00000000,00000001), ref: 02C62F2F
                                                                                                                    • _malloc.LIBCMT ref: 02C56561
                                                                                                                    • _malloc.LIBCMT ref: 02C5656C
                                                                                                                    • _malloc.LIBCMT ref: 02C56577
                                                                                                                    • _malloc.LIBCMT ref: 02C56582
                                                                                                                    • _malloc.LIBCMT ref: 02C5658D
                                                                                                                    • _malloc.LIBCMT ref: 02C56598
                                                                                                                    • _malloc.LIBCMT ref: 02C565A7
                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 02C565BE
                                                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02C565C7
                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C565D6
                                                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02C565D9
                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 02C565E4
                                                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02C565E7
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C56621
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C5662E
                                                                                                                    • _malloc.LIBCMT ref: 02C56652
                                                                                                                    • _malloc.LIBCMT ref: 02C56660
                                                                                                                    • _malloc.LIBCMT ref: 02C56667
                                                                                                                    • _malloc.LIBCMT ref: 02C5668D
                                                                                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 02C566A0
                                                                                                                    • Sleep.KERNEL32 ref: 02C566AE
                                                                                                                    • _malloc.LIBCMT ref: 02C566BA
                                                                                                                    • _malloc.LIBCMT ref: 02C566C7
                                                                                                                    • Sleep.KERNEL32(0000EA60), ref: 02C56708
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C56713
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C56724
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _malloc$Heap$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$cid=%.8x&connected=%d&sport=%d&high_port=%x&low_port=%x&stream=%d&os=%d.%d.%04d&dgt=%d&dti=%d$ntdll.dll$sprintf$strcat
                                                                                                                    • API String ID: 4273019447-2678694477
                                                                                                                    • Opcode ID: db6b44fe8074ac103f1f521d3cbdc210a46f6f9f849a981727a7a191f687dc9e
                                                                                                                    • Instruction ID: de86034e2ab0b3c3f13dc6a224ffe3e9839a717ab7d6d2f69470e45181a7bd53
                                                                                                                    • Opcode Fuzzy Hash: db6b44fe8074ac103f1f521d3cbdc210a46f6f9f849a981727a7a191f687dc9e
                                                                                                                    • Instruction Fuzzy Hash: EE71E4B1D44350AFE320AF709C48B6BBFE9AF85710F104C29F98597280EBB49805DF96

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 574 401b4b-401b68 LoadLibraryA 575 401c21-401c25 574->575 576 401b6e-401b7f GetProcAddress 574->576 577 401b85-401b8e 576->577 578 401c18-401c1b FreeLibrary 576->578 579 401b95-401ba5 GetAdaptersInfo 577->579 578->575 580 401ba7-401bb0 579->580 581 401bdb-401be3 579->581 584 401bc1-401bd7 call 402bc0 call 4018cc 580->584 585 401bb2-401bb6 580->585 582 401be5-401beb call 402ba6 581->582 583 401bec-401bf0 581->583 582->583 588 401bf2-401bf6 583->588 589 401c15-401c17 583->589 584->581 585->581 590 401bb8-401bbf 585->590 588->589 593 401bf8-401bfb 588->593 589->578 590->584 590->585 595 401c06-401c13 call 402b98 593->595 596 401bfd-401c03 593->596 595->579 595->589 596->595
                                                                                                                    APIs
                                                                                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00401B5D
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 00401B74
                                                                                                                    • GetAdaptersInfo.IPHLPAPI(?,00000400), ref: 00401B9D
                                                                                                                    • FreeLibrary.KERNEL32(00401A3E), ref: 00401C1B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                                                    • String ID: GetAdaptersInfo$iphlpapi.dll$o
                                                                                                                    • API String ID: 514930453-3667123677
                                                                                                                    • Opcode ID: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                                                                    • Instruction ID: 9300e3b8f0653b0f10764aaa79a1f2494f67c894d04353eb45b18fdb2f867aae
                                                                                                                    • Opcode Fuzzy Hash: 4786119c2dd8152e4b47b2a924d6ecb004799f19bdb0843ab8028876a5fcac46
                                                                                                                    • Instruction Fuzzy Hash: 9621B870944109AFEF11DF65C944BEF7BB8EF41344F1440BAE504B22E1E778A985CB69

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 648 2c5f8de-2c5f901 LoadLibraryA 649 2c5f907-2c5f915 GetProcAddress 648->649 650 2c5f9c1-2c5f9c8 648->650 651 2c5f91b-2c5f92b 649->651 652 2c5f9ba-2c5f9bb FreeLibrary 649->652 653 2c5f92d-2c5f939 GetAdaptersInfo 651->653 652->650 654 2c5f971-2c5f979 653->654 655 2c5f93b 653->655 657 2c5f982-2c5f987 654->657 658 2c5f97b-2c5f981 call 2c636eb 654->658 656 2c5f93d-2c5f944 655->656 661 2c5f946-2c5f94a 656->661 662 2c5f94e-2c5f956 656->662 659 2c5f9b5-2c5f9b9 657->659 660 2c5f989-2c5f98c 657->660 658->657 659->652 660->659 664 2c5f98e-2c5f993 660->664 661->656 665 2c5f94c 661->665 666 2c5f959-2c5f95e 662->666 668 2c5f995-2c5f99d 664->668 669 2c5f9a0-2c5f9ab call 2c63a8f 664->669 665->654 666->666 670 2c5f960-2c5f96d call 2c5f62d 666->670 668->669 669->659 675 2c5f9ad-2c5f9b0 669->675 670->654 675->653
                                                                                                                    APIs
                                                                                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 02C5F8F4
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 02C5F90D
                                                                                                                    • GetAdaptersInfo.IPHLPAPI(?,?), ref: 02C5F932
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 02C5F9BB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                                                    • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                                                    • API String ID: 514930453-3114217049
                                                                                                                    • Opcode ID: 79d0db7b9d1d3af4624fde7f6a42c964a65236db32fabb75b99d62f8ba7ff5d9
                                                                                                                    • Instruction ID: 077a76fe61696d1397ee8ac25f91b185b71c15aa5e88731f8d5fb57374d3c699
                                                                                                                    • Opcode Fuzzy Hash: 79d0db7b9d1d3af4624fde7f6a42c964a65236db32fabb75b99d62f8ba7ff5d9
                                                                                                                    • Instruction Fuzzy Hash: 0921FB71D04619ABDB14DF69D8846EEBBF8EF46310F0440ADDD45E7601D730CA85CBA8

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 676 4021bf-40221e GetCommandLineW CommandLineToArgvW GetLocalTime call 401f27 680 4021f2-4021f6 676->680 681 402224-40232d lstrcmpiW 676->681 683 40b873-40b879 StartServiceCtrlDispatcherA 680->683 684 40b242-40b85e 681->684 685 402333-40b436 call 402bc0 681->685 688 40ba1e 683->688 684->683 685->688 691 40ba1f 688->691 691->691
                                                                                                                    APIs
                                                                                                                    • GetCommandLineW.KERNEL32 ref: 004021C2
                                                                                                                    • CommandLineToArgvW.SHELL32(00000000), ref: 004021C9
                                                                                                                    • GetLocalTime.KERNEL32(00409F90), ref: 004021DE
                                                                                                                    • lstrcmpiW.KERNEL32(?,/chk), ref: 00402325
                                                                                                                    • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 0040B873
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CommandLine$ArgvCtrlDispatcherLocalServiceStartTimelstrcmpi
                                                                                                                    • String ID: /chk
                                                                                                                    • API String ID: 2754978024-3837807730
                                                                                                                    • Opcode ID: 8d228118e2e74c48a53476fdc18916d06dbf65557009dab26d48ecf82997b4bd
                                                                                                                    • Instruction ID: b054fd9afc26bf5eb835bf6cc08319075a3889170a15b1758122d4de2b136ef1
                                                                                                                    • Opcode Fuzzy Hash: 8d228118e2e74c48a53476fdc18916d06dbf65557009dab26d48ecf82997b4bd
                                                                                                                    • Instruction Fuzzy Hash: 4E018171848206EBCB007FB19F5C53E76A8EA05305361843BE413F62E1D7BC9516ABAF

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 749 2c5f7da-2c5f805 CreateFileA 750 2c5f8d6-2c5f8dd 749->750 751 2c5f80b-2c5f820 749->751 752 2c5f823-2c5f845 DeviceIoControl 751->752 753 2c5f847-2c5f84f 752->753 754 2c5f87e-2c5f886 752->754 755 2c5f851-2c5f856 753->755 756 2c5f858-2c5f85d 753->756 757 2c5f88f-2c5f891 754->757 758 2c5f888-2c5f88e call 2c636eb 754->758 755->754 756->754 759 2c5f85f-2c5f867 756->759 761 2c5f893-2c5f896 757->761 762 2c5f8cc-2c5f8d5 CloseHandle 757->762 758->757 763 2c5f86a-2c5f86f 759->763 765 2c5f8b2-2c5f8bf call 2c63a8f 761->765 766 2c5f898-2c5f8a1 GetLastError 761->766 762->750 763->763 768 2c5f871-2c5f87d call 2c5f62d 763->768 765->762 773 2c5f8c1-2c5f8c7 765->773 766->762 769 2c5f8a3-2c5f8a6 766->769 768->754 769->765 770 2c5f8a8-2c5f8af 769->770 770->765 773->752
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 02C5F7F9
                                                                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 02C5F837
                                                                                                                    • GetLastError.KERNEL32 ref: 02C5F898
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 02C5F8CF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                                                    • String ID: \\.\PhysicalDrive0
                                                                                                                    • API String ID: 4026078076-1180397377
                                                                                                                    • Opcode ID: fb0a15a1ecad31629a60a111af24ac111e02a27cb5e2bc20da788ad3380b96b8
                                                                                                                    • Instruction ID: e318da8a7da1dc43d1b53762f7e1f678f34e54e047c9a097349b9c3a5a37a4c5
                                                                                                                    • Opcode Fuzzy Hash: fb0a15a1ecad31629a60a111af24ac111e02a27cb5e2bc20da788ad3380b96b8
                                                                                                                    • Instruction Fuzzy Hash: B331C371D00229ABDB28DF94C884BAEBBB8FF47714F20416EE904A7680D7749B44CBD4

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 775 401a4f-401a77 CreateFileA 776 401b45-401b4a 775->776 777 401a7d-401a91 775->777 778 401a98-401ac0 DeviceIoControl 777->778 779 401ac2-401aca 778->779 780 401af3-401afb 778->780 783 401ad4-401ad9 779->783 784 401acc-401ad2 779->784 781 401b04-401b07 780->781 782 401afd-401b03 call 402ba6 780->782 787 401b09-401b0c 781->787 788 401b3a-401b44 CloseHandle 781->788 782->781 783->780 785 401adb-401af1 call 402bc0 call 4018cc 783->785 784->780 785->780 791 401b27-401b34 call 402b98 787->791 792 401b0e-401b17 GetLastError 787->792 788->776 791->778 791->788 792->788 795 401b19-401b1c 792->795 795->791 798 401b1e-401b24 795->798 798->791
                                                                                                                    APIs
                                                                                                                    • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 00401A6B
                                                                                                                    • DeviceIoControl.KERNEL32(?,002D1400,?,0000000C,?,00000400,00000400,00000000), ref: 00401AB2
                                                                                                                    • GetLastError.KERNEL32 ref: 00401B0E
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00401B3D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                                                    • String ID: \\.\PhysicalDrive0
                                                                                                                    • API String ID: 4026078076-1180397377
                                                                                                                    • Opcode ID: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                                                                    • Instruction ID: c07866d4b4e887281577b2397114bebd63d98cfae9bba907e2345ee80fd6f57b
                                                                                                                    • Opcode Fuzzy Hash: a2e68a95d94bbc6a40bee8a11280b17da373fae52957672b226b91710cefcd17
                                                                                                                    • Instruction Fuzzy Hash: 00316D71D01118EACB21EFA5CD849EFBBB9FF41750F20417AE515B22A0E3786E45CB98
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CtrlDispatcherEventExitProcessServiceStartlstrcmpi
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1436401003-0
                                                                                                                    • Opcode ID: 098332ce0749abc40dfe58039cb5c2a4bccdb4a59c08c4cab7c2a968a3d68531
                                                                                                                    • Instruction ID: 6570ecfbe007f399bfedd41ef4ad3d5047ce32712c5ad6527e9606b6434ba9f7
                                                                                                                    • Opcode Fuzzy Hash: 098332ce0749abc40dfe58039cb5c2a4bccdb4a59c08c4cab7c2a968a3d68531
                                                                                                                    • Instruction Fuzzy Hash: 06E032B1048105EAD711ABE18F8D9AA36ACAA08345720443BA907F10E2E77C9546AA3E
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c8a000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID: Vu~
                                                                                                                    • API String ID: 3472027048-2795209468
                                                                                                                    • Opcode ID: 55def2ab710a7c1c6d23cf49c213828ac1507663b6763f28e9a82b1aa5324948
                                                                                                                    • Instruction ID: 8f6f9e05e4df4c16ec1f54ea64b7d4badfc0aaf0064329e8cdade2ffdbd4e704
                                                                                                                    • Opcode Fuzzy Hash: 55def2ab710a7c1c6d23cf49c213828ac1507663b6763f28e9a82b1aa5324948
                                                                                                                    • Instruction Fuzzy Hash: A24181B251C6049FE311BA19DC857AAF7E9EF98310F16892CE7D4C3744EA3598048A97

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C51D11
                                                                                                                    • GetLastError.KERNEL32 ref: 02C51D23
                                                                                                                      • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 02C51D59
                                                                                                                    • GetLastError.KERNEL32 ref: 02C51D6B
                                                                                                                    • __beginthreadex.LIBCMT ref: 02C51DB1
                                                                                                                    • GetLastError.KERNEL32 ref: 02C51DC6
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C51DDD
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C51DEC
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 02C51E14
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C51E1B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                                                                                                                    • String ID: thread$thread.entry_event$thread.exit_event
                                                                                                                    • API String ID: 831262434-3017686385
                                                                                                                    • Opcode ID: 24441dd18b9f8445080a0932b86e11a9e5fd9cefe71196033c9300f2f03fdf5e
                                                                                                                    • Instruction ID: 9155ac50f104d58d45fc65296e749b67561c380bcf2372169a3c0c5ed658a51d
                                                                                                                    • Opcode Fuzzy Hash: 24441dd18b9f8445080a0932b86e11a9e5fd9cefe71196033c9300f2f03fdf5e
                                                                                                                    • Instruction Fuzzy Hash: AF31BB71A403119FD700EF24C888B2BBBA5FB84754F144A2DF8599B290DBB0D989CFD2

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C54D8B
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C54DB7
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C54DC3
                                                                                                                      • Part of subcall function 02C54BED: __EH_prolog.LIBCMT ref: 02C54BF2
                                                                                                                      • Part of subcall function 02C54BED: InterlockedExchange.KERNEL32(?,00000000), ref: 02C54CF2
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C54E93
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C54E99
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C54EA0
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C54EA6
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C550A7
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C550AD
                                                                                                                    • RtlEnterCriticalSection.NTDLL(02C871B8), ref: 02C550B8
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(02C871B8), ref: 02C550C1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave$H_prolog$ExchangeInterlocked
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2062355503-0
                                                                                                                    • Opcode ID: c23f0f1a7f1872d23d4302e60bfacbb072fb32ff90534c84be0d1da892ff079b
                                                                                                                    • Instruction ID: 7e04f1a7493bf322de2c12d1f5b6af5c7c316453c7739c991a199827f5aeb04d
                                                                                                                    • Opcode Fuzzy Hash: c23f0f1a7f1872d23d4302e60bfacbb072fb32ff90534c84be0d1da892ff079b
                                                                                                                    • Instruction Fuzzy Hash: 98B16E71D0026DDFEF25DFA0C844BEDBBB5AF44314F10415AE8057A280DBB49A89CFA5

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 600 401f64-401f84 FindResourceA 601 401f86-401f9d GetLastError SizeofResource 600->601 602 401f9f-401fa1 600->602 601->602 603 401fa6-401fec LoadResource LockResource GlobalAlloc call 402800 * 2 601->603 604 402096-40209a 602->604 609 401fee-401ff9 603->609 609->609 610 401ffb-402003 GetTickCount 609->610 611 402032-402038 610->611 612 402005-402007 610->612 613 402053-402083 GlobalAlloc call 401c26 611->613 614 40203a-40204a 611->614 612->613 615 402009-40200f 612->615 620 402088-402093 613->620 616 40204c 614->616 617 40204e-402051 614->617 615->613 619 402011-402023 615->619 616->617 617->613 617->614 621 402025 619->621 622 402027-40202a 619->622 620->604 621->622 622->619 623 40202c-40202e 622->623 623->615 624 402030 623->624 624->613
                                                                                                                    APIs
                                                                                                                    • FindResourceA.KERNEL32(?,0000000A), ref: 00401F7A
                                                                                                                    • GetLastError.KERNEL32 ref: 00401F86
                                                                                                                    • SizeofResource.KERNEL32(00000000), ref: 00401F93
                                                                                                                    • LoadResource.KERNEL32(00000000), ref: 00401FAD
                                                                                                                    • LockResource.KERNEL32(00000000), ref: 00401FB4
                                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00401FBF
                                                                                                                    • GetTickCount.KERNEL32 ref: 00401FFB
                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00402061
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$AllocGlobal$CountErrorFindLastLoadLockSizeofTick
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 564119183-0
                                                                                                                    • Opcode ID: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                                                                    • Instruction ID: 3f373f2fe47a9e58058ec223940fe379f908771e1a31376a549d0366c6000c22
                                                                                                                    • Opcode Fuzzy Hash: c339dbb3d4f54c4bfe23240511e1faf338c1a50a53de60f6f0a2310917010a4d
                                                                                                                    • Instruction Fuzzy Hash: D0314C32A402516FDB109FB99E889AF7FB8EF45344B10807AFA46F7291D6748841C7A8

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C52706
                                                                                                                    • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C5272B
                                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C75A93), ref: 02C52738
                                                                                                                      • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                                                                    • SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02C52778
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C527D9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                                                    • String ID: timer
                                                                                                                    • API String ID: 4293676635-1792073242
                                                                                                                    • Opcode ID: 1159d4dc67ca43308b90cce883f95094eb3088a0b70457831e6e3ccc789750fa
                                                                                                                    • Instruction ID: 79ff60a4f4d72eabb0fecf3dffd14288a5cc7b99a844a88762a86c491b2ae48b
                                                                                                                    • Opcode Fuzzy Hash: 1159d4dc67ca43308b90cce883f95094eb3088a0b70457831e6e3ccc789750fa
                                                                                                                    • Instruction Fuzzy Hash: AC31AEB1944716AFD310DF65C984B26BBE8FB48764F004A2EFC5583A80E770E958CF96

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 692 2c52b95-2c52baf 693 2c52bc7-2c52bcb 692->693 694 2c52bb1-2c52bb9 call 2c60a50 692->694 695 2c52bcd-2c52bd0 693->695 696 2c52bdf 693->696 701 2c52bbf-2c52bc2 694->701 695->696 698 2c52bd2-2c52bdd call 2c60a50 695->698 699 2c52be2-2c52c11 WSASetLastError WSARecv call 2c5a440 696->699 698->701 706 2c52c16-2c52c1d 699->706 704 2c52d30 701->704 707 2c52d32-2c52d38 704->707 708 2c52c2c-2c52c32 706->708 709 2c52c1f-2c52c2a call 2c60a50 706->709 711 2c52c34-2c52c39 call 2c60a50 708->711 712 2c52c46-2c52c48 708->712 720 2c52c3f-2c52c42 709->720 711->720 713 2c52c4f-2c52c60 call 2c60a50 712->713 714 2c52c4a-2c52c4d 712->714 713->707 718 2c52c66-2c52c69 713->718 714->718 722 2c52c73-2c52c76 718->722 723 2c52c6b-2c52c6d 718->723 720->712 722->704 725 2c52c7c-2c52c9a call 2c60a50 call 2c5166f 722->725 723->722 724 2c52d22-2c52d2d call 2c51996 723->724 724->704 732 2c52cbc-2c52cfa WSASetLastError select call 2c5a440 725->732 733 2c52c9c-2c52cba call 2c60a50 call 2c5166f 725->733 739 2c52cfc-2c52d06 call 2c60a50 732->739 740 2c52d08 732->740 733->704 733->732 747 2c52d19-2c52d1d 739->747 743 2c52d15-2c52d17 740->743 744 2c52d0a-2c52d12 call 2c60a50 740->744 743->704 743->747 744->743 747->699
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C52BE4
                                                                                                                    • WSARecv.WS2_32(?,?,?,?,?,00000000,00000000), ref: 02C52C07
                                                                                                                      • Part of subcall function 02C5A440: WSAGetLastError.WS2_32(00000000,?,?,02C52A51), ref: 02C5A44E
                                                                                                                    • WSASetLastError.WS2_32 ref: 02C52CD3
                                                                                                                    • select.WS2_32(?,?,00000000,00000000,00000000), ref: 02C52CE7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$Recvselect
                                                                                                                    • String ID: 3'
                                                                                                                    • API String ID: 886190287-280543908
                                                                                                                    • Opcode ID: 5071b9dc3d282afeb512299e5fdd7cdabd7cb42109120662a5c119c3ebf86a8c
                                                                                                                    • Instruction ID: b6d1840bdc492fe9639e8290b5680f0105c883ec9ea47291312aa647138b9780
                                                                                                                    • Opcode Fuzzy Hash: 5071b9dc3d282afeb512299e5fdd7cdabd7cb42109120662a5c119c3ebf86a8c
                                                                                                                    • Instruction Fuzzy Hash: 3A418BB19043118FD7119F74C84876BBBE9BF94358F10091EEC9A93281EB74D584CB96

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 800 2c529ee-2c52a06 801 2c52ab3-2c52abb call 2c60a50 800->801 802 2c52a0c-2c52a10 800->802 811 2c52abe-2c52ac6 801->811 803 2c52a12-2c52a15 802->803 804 2c52a39-2c52a4c WSASetLastError closesocket call 2c5a440 802->804 803->804 806 2c52a17-2c52a36 call 2c60a50 call 2c52f50 803->806 810 2c52a51-2c52a55 804->810 806->804 810->801 812 2c52a57-2c52a5f call 2c60a50 810->812 818 2c52a61-2c52a67 812->818 819 2c52a69-2c52a71 call 2c60a50 812->819 818->819 820 2c52a7b-2c52aad ioctlsocket WSASetLastError closesocket call 2c5a440 818->820 824 2c52a73-2c52a79 819->824 825 2c52aaf-2c52ab1 819->825 820->825 824->820 824->825 825->801 825->811
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C52A3B
                                                                                                                    • closesocket.WS2_32 ref: 02C52A42
                                                                                                                    • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 02C52A89
                                                                                                                    • WSASetLastError.WS2_32(00000000,?,8004667E,00000000), ref: 02C52A97
                                                                                                                    • closesocket.WS2_32 ref: 02C52A9E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastclosesocket$ioctlsocket
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1561005644-0
                                                                                                                    • Opcode ID: e292180af0e08eed4d4fd0390d31905642ae9615285b6a934ab778e581ab9cb9
                                                                                                                    • Instruction ID: 2c28214d999915f5711a7c068aa4124f99d27989d6e11a40645a17c3acf267a9
                                                                                                                    • Opcode Fuzzy Hash: e292180af0e08eed4d4fd0390d31905642ae9615285b6a934ab778e581ab9cb9
                                                                                                                    • Instruction Fuzzy Hash: C6216A71E40215AFEB209BB8C848B7AB3E9EF84315F114A6DFC15D3241EB30CA84CB52

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 827 2c51ba7-2c51bcf call 2c75330 RtlEnterCriticalSection 830 2c51bd1 827->830 831 2c51be9-2c51bf7 RtlLeaveCriticalSection call 2c5e267 827->831 832 2c51bd4-2c51be0 call 2c51b79 830->832 834 2c51bfa-2c51c20 RtlEnterCriticalSection 831->834 837 2c51c55-2c51c6e RtlLeaveCriticalSection 832->837 838 2c51be2-2c51be7 832->838 836 2c51c34-2c51c36 834->836 839 2c51c22-2c51c2f call 2c51b79 836->839 840 2c51c38-2c51c43 836->840 838->831 838->832 842 2c51c45-2c51c4b 839->842 845 2c51c31 839->845 840->842 842->837 844 2c51c4d-2c51c51 842->844 844->837 845->836
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C51BAC
                                                                                                                    • RtlEnterCriticalSection.NTDLL ref: 02C51BBC
                                                                                                                    • RtlLeaveCriticalSection.NTDLL ref: 02C51BEA
                                                                                                                    • RtlEnterCriticalSection.NTDLL ref: 02C51C13
                                                                                                                    • RtlLeaveCriticalSection.NTDLL ref: 02C51C56
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave$H_prolog
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1633115879-0
                                                                                                                    • Opcode ID: 353ba77c0accf80ac97e435fcaeb0da5d5f968150c3a9c904f0545c091427798
                                                                                                                    • Instruction ID: 934d248865c15dff474fe9334265db538099d517d7f9ea131b5281c20f95bb50
                                                                                                                    • Opcode Fuzzy Hash: 353ba77c0accf80ac97e435fcaeb0da5d5f968150c3a9c904f0545c091427798
                                                                                                                    • Instruction Fuzzy Hash: 6421DEB5A00624DFCB14CF68C44879ABBB5FF88310F15858AEC199B301DBB1EA45CBE0

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 847 402703-40270a 848 4026d0-4026d1 847->848 849 40270c 847->849 850 402713-402719 848->850 851 4026d3-4026e7 848->851 852 402781-40278e 849->852 853 40270e-40270f 849->853 850->852 854 4027a1-40ba1e RegCloseKey SetEvent call 4022cb ExitProcess StartServiceCtrlDispatcherA 851->854 852->854 855 40b2ac-40b2ad 852->855 853->850 862 40ba1f 854->862 862->862
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • Edrax Smart Maker 9.28.43, xrefs: 00402789
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEventExitProcess
                                                                                                                    • String ID: Edrax Smart Maker 9.28.43
                                                                                                                    • API String ID: 1531885446-3805296873
                                                                                                                    • Opcode ID: 408914eee7edb9041bd6f0e3ab597492cb98f8076ad42f3317b3e2c44c7c2361
                                                                                                                    • Instruction ID: 9619b6c57bb372c65d0101e10de8a913b7f8b07a605614d626a75753d6b4725e
                                                                                                                    • Opcode Fuzzy Hash: 408914eee7edb9041bd6f0e3ab597492cb98f8076ad42f3317b3e2c44c7c2361
                                                                                                                    • Instruction Fuzzy Hash: 5DF0F072C486019BC70157B09E0D49A3F70EA523007264ABBE40BB72E2E37D4812A76E
                                                                                                                    APIs
                                                                                                                    • RegCloseKey.KERNEL32(?), ref: 0040251D
                                                                                                                    • RegQueryValueExA.KERNEL32(?,Common AppData), ref: 0040B3E5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseQueryValue
                                                                                                                    • String ID: Common AppData$Edrax Smart Maker 9.28.43
                                                                                                                    • API String ID: 3356406503-980341776
                                                                                                                    • Opcode ID: e6a2e908b4f8ac4bb90b0a0694ce372338ed560ef95d816fb37fdd6f9fd74793
                                                                                                                    • Instruction ID: 1fc287baa934b2d4d76c9a2b6723fd62ff9cd585f2c1e6a0ea64aa5dcf91fb1c
                                                                                                                    • Opcode Fuzzy Hash: e6a2e908b4f8ac4bb90b0a0694ce372338ed560ef95d816fb37fdd6f9fd74793
                                                                                                                    • Instruction Fuzzy Hash: 36E06D2498D101FAD6025BA05E0CC7F6968D948300B308977A503710E1C3BC44127AAF
                                                                                                                    APIs
                                                                                                                    • GetVersion.KERNEL32 ref: 00402D86
                                                                                                                      • Part of subcall function 004039F0: HeapCreate.KERNEL32(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                                                                      • Part of subcall function 004039F0: HeapDestroy.KERNEL32 ref: 00403A40
                                                                                                                    • GetCommandLineA.KERNEL32 ref: 00402DD4
                                                                                                                    • GetStartupInfoA.KERNEL32(?), ref: 00402DFF
                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402E22
                                                                                                                      • Part of subcall function 00402E7B: ExitProcess.KERNEL32 ref: 00402E98
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2057626494-0
                                                                                                                    • Opcode ID: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                                                                    • Instruction ID: f31f1ce04d2051e6b9e8acf883bbbbaa5bd69f55a1c9941ff1c46623f1a3e60c
                                                                                                                    • Opcode Fuzzy Hash: 9e286e5f9a377e3797ece88135c359dedbbb575cc14907a13f37508a60b21901
                                                                                                                    • Instruction Fuzzy Hash: AD219FB0840715AADB04EFA6DE09A6E7BB8EB04704F10413FF502B72E2DB388510CB59
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C52EEE
                                                                                                                    • WSASocketA.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C52EFD
                                                                                                                    • WSAGetLastError.WS2_32(?,?,?,00000000,00000000,00000001), ref: 02C52F0C
                                                                                                                    • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 02C52F36
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$Socketsetsockopt
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2093263913-0
                                                                                                                    • Opcode ID: d22679061166524a675bd154d0d55400cddf41ee64f31673da8fb173cfebcd39
                                                                                                                    • Instruction ID: 609136c2ce9c7d165dc7a7594f6fa7e0fc5259d7063eb769b808e4bcb11a77c0
                                                                                                                    • Opcode Fuzzy Hash: d22679061166524a675bd154d0d55400cddf41ee64f31673da8fb173cfebcd39
                                                                                                                    • Instruction Fuzzy Hash: AC018871940218FBDB205F65DC88F5ABBA9EB89761F008665F918DB181D771C9048BB1
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEventExitProcessValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1107189876-0
                                                                                                                    • Opcode ID: f8167a881b3cc739b4387dca57ef85349e6c0624228f547e3752a2ed983260f9
                                                                                                                    • Instruction ID: 43a96b322e13dc454d48ae558c1db46560250af61e7731020501bb74e1b246de
                                                                                                                    • Opcode Fuzzy Hash: f8167a881b3cc739b4387dca57ef85349e6c0624228f547e3752a2ed983260f9
                                                                                                                    • Instruction Fuzzy Hash: 58D0C975444000EBC7016BF0AF0D51D3E39BB043157210439F207700A2CB3950609B2E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C52D39: WSASetLastError.WS2_32(00000000), ref: 02C52D47
                                                                                                                      • Part of subcall function 02C52D39: WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C52D5C
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C52E6D
                                                                                                                    • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 02C52E83
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$Sendselect
                                                                                                                    • String ID: 3'
                                                                                                                    • API String ID: 2958345159-280543908
                                                                                                                    • Opcode ID: 438895ff0b1bf8f1e480f722d015c1f361c237a01a3c16ffda4a3b2cea8133b0
                                                                                                                    • Instruction ID: 7766332ac3afbf458d6a3cae6aca74176cc781d1d2c96f80d8aeacc3b9d38c8c
                                                                                                                    • Opcode Fuzzy Hash: 438895ff0b1bf8f1e480f722d015c1f361c237a01a3c16ffda4a3b2cea8133b0
                                                                                                                    • Instruction Fuzzy Hash: 3731DEB1A002299FDB11DFA0C848BEE7BEABF44358F00455ADC0993280E7B5D5D5CFA6
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C52AEA
                                                                                                                    • connect.WS2_32(?,?,?), ref: 02C52AF5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastconnect
                                                                                                                    • String ID: 3'
                                                                                                                    • API String ID: 374722065-280543908
                                                                                                                    • Opcode ID: 6eb027d75c5c1b0492361dc61b7d6b4bb0b6052b59b5d8bad3cdc35e6f105a1c
                                                                                                                    • Instruction ID: 4025670b6e93d0668cb3bba5b3b1c504775b2418cd2435efb0d1b4fb856ad0ad
                                                                                                                    • Opcode Fuzzy Hash: 6eb027d75c5c1b0492361dc61b7d6b4bb0b6052b59b5d8bad3cdc35e6f105a1c
                                                                                                                    • Instruction Fuzzy Hash: 2921A770E00214ABCF14AFB4C448ABEBBFAFF84364F008599DC19A7281EB74C6459F95
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3519838083-0
                                                                                                                    • Opcode ID: 139f31b2f36de44c25f1e43f2f1d8cf349f720e75e0acef2fd5a7219213a1e59
                                                                                                                    • Instruction ID: 91dff2d602958ad01414dd858a00530b0fae462e505a172ed9f58cc9b56c5266
                                                                                                                    • Opcode Fuzzy Hash: 139f31b2f36de44c25f1e43f2f1d8cf349f720e75e0acef2fd5a7219213a1e59
                                                                                                                    • Instruction Fuzzy Hash: 1B5128B1904256DFCB09CF68C444AAABBF1FF48360F14819EE8299B380D774DA50CFA5
                                                                                                                    APIs
                                                                                                                    • InterlockedIncrement.KERNEL32(?), ref: 02C536A7
                                                                                                                      • Part of subcall function 02C52420: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C52432
                                                                                                                      • Part of subcall function 02C52420: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C52445
                                                                                                                      • Part of subcall function 02C52420: RtlEnterCriticalSection.NTDLL(?), ref: 02C52454
                                                                                                                      • Part of subcall function 02C52420: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52469
                                                                                                                      • Part of subcall function 02C52420: RtlLeaveCriticalSection.NTDLL(?), ref: 02C52470
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Interlocked$CriticalExchangeSection$CompareCompletionEnterIncrementLeavePostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1601054111-0
                                                                                                                    • Opcode ID: 33f4c4338005e256c24d3b67d4cd4dcbbae38fd9366f0a6f38c53545687809fc
                                                                                                                    • Instruction ID: 90c67060db419a33b8c1269dfb083edad7cefe76046c960170fc8bbe0139d8b6
                                                                                                                    • Opcode Fuzzy Hash: 33f4c4338005e256c24d3b67d4cd4dcbbae38fd9366f0a6f38c53545687809fc
                                                                                                                    • Instruction Fuzzy Hash: 3F11C1B5500259ABDB218E14CC85FAA3BAAFF403D4F10455AFD568B290CB34D9A4CBA8
                                                                                                                    APIs
                                                                                                                    • __beginthreadex.LIBCMT ref: 02C62046
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,00000002,02C5A8C0,00000000), ref: 02C62077
                                                                                                                    • ResumeThread.KERNEL32(?,?,?,?,?,00000002,02C5A8C0,00000000), ref: 02C62085
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleResumeThread__beginthreadex
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1685284544-0
                                                                                                                    • Opcode ID: a7a17ec3bcce60af79ca3bf7218de3a5ac61f4967db7beff062239981e29523c
                                                                                                                    • Instruction ID: 966f213f1dd34810bcc403eaa590d8e89647c497069e71dc3a5108acde93f7dc
                                                                                                                    • Opcode Fuzzy Hash: a7a17ec3bcce60af79ca3bf7218de3a5ac61f4967db7beff062239981e29523c
                                                                                                                    • Instruction Fuzzy Hash: CBF0C2702402006BE7209E6CDCC8FA1B3E8AF88724F24056AF548D7280C371E896DBD0
                                                                                                                    APIs
                                                                                                                    • InterlockedIncrement.KERNEL32(02C8727C), ref: 02C51ABA
                                                                                                                    • WSAStartup.WS2_32(00000002,00000000), ref: 02C51ACB
                                                                                                                    • InterlockedExchange.KERNEL32(02C87280,00000000), ref: 02C51AD7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Interlocked$ExchangeIncrementStartup
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1856147945-0
                                                                                                                    • Opcode ID: 3af47c57343450dcd9218952e3d9f67ae79068b1e85fc1d69e0eb0fecdd2d883
                                                                                                                    • Instruction ID: c05e552ec3e0a7d93b199b6654c071a29420412fe229472118cda4e5d7a8e586
                                                                                                                    • Opcode Fuzzy Hash: 3af47c57343450dcd9218952e3d9f67ae79068b1e85fc1d69e0eb0fecdd2d883
                                                                                                                    • Instruction Fuzzy Hash: 56D05E759D02189BE32076B0AD0EB78F72CF706625F100765FC6AC00C0EB91562C86E7
                                                                                                                    APIs
                                                                                                                    • RegQueryValueExA.KERNEL32(?,Common AppData), ref: 0040B3E5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: QueryValue
                                                                                                                    • String ID: Common AppData
                                                                                                                    • API String ID: 3660427363-2574214464
                                                                                                                    • Opcode ID: 5697d057cabc17960e101dec80fcc5a73380f516d124423ae486c0cb8c61e994
                                                                                                                    • Instruction ID: 90c95f6ae697e09814c337d77a7258fe122dfdcfe3475e687a0ce48b6aa61137
                                                                                                                    • Opcode Fuzzy Hash: 5697d057cabc17960e101dec80fcc5a73380f516d124423ae486c0cb8c61e994
                                                                                                                    • Instruction Fuzzy Hash: 5B11363548C349AECB11CEA08E087A93A90EB41354F2485BBC9527A2C2D37CD516A6DF
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040B2B5
                                                                                                                    Strings
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 0040B0F3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Open
                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                    • API String ID: 71445658-2036018995
                                                                                                                    • Opcode ID: 555321f52169123a9d70816e35fad76f5a5464f44925242c47b6e944e1dea001
                                                                                                                    • Instruction ID: 272b942c5e382e9ed40600fd6dcbd0988f90020866710aaee2f5541094ba35e5
                                                                                                                    • Opcode Fuzzy Hash: 555321f52169123a9d70816e35fad76f5a5464f44925242c47b6e944e1dea001
                                                                                                                    • Instruction Fuzzy Hash: D3D05E31918509E6E7158AA1894CFAE3AB8EB10304F308577E643F14C1E3BCAA45A79F
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Close
                                                                                                                    • String ID: Edrax Smart Maker 9.28.43
                                                                                                                    • API String ID: 3535843008-3805296873
                                                                                                                    • Opcode ID: e8351dafee76f947206332cf926af1f9a86302a0bc652ee631bde886f088d58e
                                                                                                                    • Instruction ID: fef4f91cb44e36c7a93e196c7861da108dd39da219f964484116b9c6e0692ebe
                                                                                                                    • Opcode Fuzzy Hash: e8351dafee76f947206332cf926af1f9a86302a0bc652ee631bde886f088d58e
                                                                                                                    • Instruction Fuzzy Hash: 10C01221C8E010B3DA0123916F1CCAF6E689989304B2080B7F103310E182FC54026AAF
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyExA.KERNEL32(80000002,Software\LargeTour), ref: 0040B396
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Create
                                                                                                                    • String ID: Software\LargeTour
                                                                                                                    • API String ID: 2289755597-2897053449
                                                                                                                    • Opcode ID: 739039b60b7706f8ccfafd5df864f98bc3c1b6cc9f92d6a0d08b2778a8daa9bb
                                                                                                                    • Instruction ID: f2ddcfc5918588e9751f100c00c31056290ca55f0d73bd62309d6216615e2447
                                                                                                                    • Opcode Fuzzy Hash: 739039b60b7706f8ccfafd5df864f98bc3c1b6cc9f92d6a0d08b2778a8daa9bb
                                                                                                                    • Instruction Fuzzy Hash: C1B0923028C101E9E2501A104E4EB2620899704709B3014372B13B44D482B84012B02F
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C54BF2
                                                                                                                      • Part of subcall function 02C51BA7: __EH_prolog.LIBCMT ref: 02C51BAC
                                                                                                                      • Part of subcall function 02C51BA7: RtlEnterCriticalSection.NTDLL ref: 02C51BBC
                                                                                                                      • Part of subcall function 02C51BA7: RtlLeaveCriticalSection.NTDLL ref: 02C51BEA
                                                                                                                      • Part of subcall function 02C51BA7: RtlEnterCriticalSection.NTDLL ref: 02C51C13
                                                                                                                      • Part of subcall function 02C51BA7: RtlLeaveCriticalSection.NTDLL ref: 02C51C56
                                                                                                                      • Part of subcall function 02C5E02F: __EH_prolog.LIBCMT ref: 02C5E034
                                                                                                                      • Part of subcall function 02C5E02F: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C5E0B3
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000000), ref: 02C54CF2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$H_prolog$EnterExchangeInterlockedLeave
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1927618982-0
                                                                                                                    • Opcode ID: 966b57f4825ba924677d917cda1dc0ec9426071f4095bf2b6a2ab7b79e2d30a6
                                                                                                                    • Instruction ID: 5ffcd26772727ac0a279dbc4e0aa857aeffade0b9770557a00407038f4d77858
                                                                                                                    • Opcode Fuzzy Hash: 966b57f4825ba924677d917cda1dc0ec9426071f4095bf2b6a2ab7b79e2d30a6
                                                                                                                    • Instruction Fuzzy Hash: ED514771D04258DFDB14DFA8C884AEEBBB5EF18314F14816AEC05AB351D7709A84CF54
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C52D47
                                                                                                                    • WSASend.WS2_32(?,?,?,?,00000000,00000000,00000000), ref: 02C52D5C
                                                                                                                      • Part of subcall function 02C5A440: WSAGetLastError.WS2_32(00000000,?,?,02C52A51), ref: 02C5A44E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$Send
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1282938840-0
                                                                                                                    • Opcode ID: d88ef469ee2bd97e6ea39115d604d88ca1d59628515c1278a7860ab4c1030363
                                                                                                                    • Instruction ID: e5471d08434a9510cc240f3fb89d0db8ad367d5f6e6e8c2198a9ecdb31dc492c
                                                                                                                    • Opcode Fuzzy Hash: d88ef469ee2bd97e6ea39115d604d88ca1d59628515c1278a7860ab4c1030363
                                                                                                                    • Instruction Fuzzy Hash: 0E0184B5500219EFD7205FA5C88487BBBEDFF857A4B20452EEC5993200DB71DD40DB62
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C5833E
                                                                                                                    • shutdown.WS2_32(?,00000002), ref: 02C58347
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastshutdown
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1920494066-0
                                                                                                                    • Opcode ID: 4a6c550b8eec185801e24abd22cc65819b3ac1416c55e6152c4580f9561e2100
                                                                                                                    • Instruction ID: bcd4d92a502f14e331ff710544ecb19d70f5d5cecb60850bf8248c90fe3188c1
                                                                                                                    • Opcode Fuzzy Hash: 4a6c550b8eec185801e24abd22cc65819b3ac1416c55e6152c4580f9561e2100
                                                                                                                    • Instruction Fuzzy Hash: ECF05471A44324CFC7109F59D404B6AB7E5BF48364F114A5DEDA997380D731EC50CBA5
                                                                                                                    APIs
                                                                                                                    • HeapCreate.KERNEL32(00000000,00001000,00000000,00402DBF,00000000), ref: 00403A01
                                                                                                                      • Part of subcall function 004038A8: GetVersionExA.KERNEL32 ref: 004038C7
                                                                                                                    • HeapDestroy.KERNEL32 ref: 00403A40
                                                                                                                      • Part of subcall function 00403DC7: HeapAlloc.KERNEL32(00000000,00000140,00403A29,000003F8), ref: 00403DD4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Heap$AllocCreateDestroyVersion
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2507506473-0
                                                                                                                    • Opcode ID: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                                                                    • Instruction ID: 5dadef9d12e489db140da5c14b34350ea54a5b880f3286d9e4ff1a1591b79aa3
                                                                                                                    • Opcode Fuzzy Hash: 08f14aee262382775140a5fb38b16d88e88289f6ea168ffb6a246c9e47cbf934
                                                                                                                    • Instruction Fuzzy Hash: 04F065707553016ADB24EF705E4676B3DD8AB80B53F10443BF541F41E0EB7C8690991A
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5511E
                                                                                                                      • Part of subcall function 02C53D7E: htons.WS2_32(?), ref: 02C53DA2
                                                                                                                      • Part of subcall function 02C53D7E: htonl.WS2_32(00000000), ref: 02C53DB9
                                                                                                                      • Part of subcall function 02C53D7E: htonl.WS2_32(00000000), ref: 02C53DC0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: htonl$H_prologhtons
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4039807196-0
                                                                                                                    • Opcode ID: 09412a7d76b868998298ad7f3ee2b484949b3bae4c64be57fffdb637a2b71e57
                                                                                                                    • Instruction ID: 6e4bdf4f19ce13c3efbaf0f65542537fa89c799e22f81b4f04d26c9dfb674d1e
                                                                                                                    • Opcode Fuzzy Hash: 09412a7d76b868998298ad7f3ee2b484949b3bae4c64be57fffdb637a2b71e57
                                                                                                                    • Instruction Fuzzy Hash: 1F8148B1D0425E8ECF05DFA8D490AEEBBB5EF48314F10815AD854B7240EB369A85CF78
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5E8FD
                                                                                                                      • Part of subcall function 02C51A01: TlsGetValue.KERNEL32 ref: 02C51A0A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prologValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3700342317-0
                                                                                                                    • Opcode ID: 9300749a123170369f45e90d972744b3610d9159416ac5bceeb7a9df28960905
                                                                                                                    • Instruction ID: 46b1d9b9efeed90c14c7a1189ec86021df84958b6223b79b32dbdfbf5bef14ff
                                                                                                                    • Opcode Fuzzy Hash: 9300749a123170369f45e90d972744b3610d9159416ac5bceeb7a9df28960905
                                                                                                                    • Instruction Fuzzy Hash: 52214CB2D04219AFDB00DFA5D440AEEBBF9EF49310F14801EE918A7240D771EA41DBA5
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c8a000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: 342882db51685c7bc41cde5298d20e9684bb2bf8c3347e26729346bd987061f1
                                                                                                                    • Instruction ID: b52b8507b27f6e57e43ddb71fb7913aeb74ec4aa968c2b3c26129adaf8bdb73b
                                                                                                                    • Opcode Fuzzy Hash: 342882db51685c7bc41cde5298d20e9684bb2bf8c3347e26729346bd987061f1
                                                                                                                    • Instruction Fuzzy Hash: FA0175B280C510DFE7116F29D8C86AAFBE4FF88724F05492DE6C5D3644E6758845C792
                                                                                                                    APIs
                                                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C533CC
                                                                                                                      • Part of subcall function 02C532AB: __EH_prolog.LIBCMT ref: 02C532B0
                                                                                                                      • Part of subcall function 02C532AB: RtlEnterCriticalSection.NTDLL(?), ref: 02C532C3
                                                                                                                      • Part of subcall function 02C532AB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C532EF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$CompareEnterExchangeH_prologInterlockedLeave
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1518410164-0
                                                                                                                    • Opcode ID: 116f8ee9a009fa3bc6e2ebe8f6d39d78854b2b0b4820c2bc611774de47adeded
                                                                                                                    • Instruction ID: 607b12933cd6d95dac842a41985ee1c00dcb8cd246fd8d24898c7754417b16c4
                                                                                                                    • Opcode Fuzzy Hash: 116f8ee9a009fa3bc6e2ebe8f6d39d78854b2b0b4820c2bc611774de47adeded
                                                                                                                    • Instruction Fuzzy Hash: 46019270214616AFD704CF59D885F55FBA9FF85320B10835AE928CB2C0EB70E961CBA4
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c8a000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4033686569-0
                                                                                                                    • Opcode ID: 20f1c982c42fb982facb1a070354b1e59a6301ab031ba8e36eeaa414b0f56599
                                                                                                                    • Instruction ID: c6c84c91b46d0c110009e8b4b6c4791920883522cb5e5ad039182dd94706091c
                                                                                                                    • Opcode Fuzzy Hash: 20f1c982c42fb982facb1a070354b1e59a6301ab031ba8e36eeaa414b0f56599
                                                                                                                    • Instruction Fuzzy Hash: E0F0FBF290C6149FE355BA19DC857B9BBE4DF44711F06482DD7C887640EA3544408BC6
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5E48D
                                                                                                                      • Part of subcall function 02C526DB: RtlEnterCriticalSection.NTDLL(?), ref: 02C52706
                                                                                                                      • Part of subcall function 02C526DB: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 02C5272B
                                                                                                                      • Part of subcall function 02C526DB: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02C75A93), ref: 02C52738
                                                                                                                      • Part of subcall function 02C526DB: SetWaitableTimer.KERNEL32(?,?,000493E0,00000000,00000000,00000000), ref: 02C52778
                                                                                                                      • Part of subcall function 02C526DB: RtlLeaveCriticalSection.NTDLL(?), ref: 02C527D9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSectionTimerWaitable$CreateEnterErrorH_prologLastLeave
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4293676635-0
                                                                                                                    • Opcode ID: ea93d36e5f5a6acbb8b45e0b48dd45a3a2667238c4a8b65a6d6d132ddb86cf2b
                                                                                                                    • Instruction ID: d17ae6e6c923166cca795aea24e8f469a6de9d058b563fde3ff8c880416569e8
                                                                                                                    • Opcode Fuzzy Hash: ea93d36e5f5a6acbb8b45e0b48dd45a3a2667238c4a8b65a6d6d132ddb86cf2b
                                                                                                                    • Instruction Fuzzy Hash: C101CAB0910B148FC718CF5AC144986FBF5EF88300B15C5AE985A8B321E7B0AA40CF90
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5E26C
                                                                                                                      • Part of subcall function 02C63A8F: _malloc.LIBCMT ref: 02C63AA7
                                                                                                                      • Part of subcall function 02C5E488: __EH_prolog.LIBCMT ref: 02C5E48D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$_malloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4254904621-0
                                                                                                                    • Opcode ID: 26f08e74ca10f4b408bbfb8f9242158cbe312096df16f5d4c769dcd9ccfcd338
                                                                                                                    • Instruction ID: fe009121d32c71cfeba0ff9fb5e689f6200cd98bc383ea52faafd9431471853b
                                                                                                                    • Opcode Fuzzy Hash: 26f08e74ca10f4b408bbfb8f9242158cbe312096df16f5d4c769dcd9ccfcd338
                                                                                                                    • Instruction Fuzzy Hash: E4E0C270A04205ABDF0CDFA8DC0077D77A6EB48300F0082ADBC0CE6640DB708E409A54
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C65B9A: __getptd_noexit.LIBCMT ref: 02C65B9B
                                                                                                                      • Part of subcall function 02C65B9A: __amsg_exit.LIBCMT ref: 02C65BA8
                                                                                                                      • Part of subcall function 02C633D6: __getptd_noexit.LIBCMT ref: 02C633DA
                                                                                                                      • Part of subcall function 02C633D6: __freeptd.LIBCMT ref: 02C633F4
                                                                                                                      • Part of subcall function 02C633D6: RtlExitUserThread.NTDLL(?,00000000,?,02C633B6,00000000), ref: 02C633FD
                                                                                                                    • __XcptFilter.LIBCMT ref: 02C633C2
                                                                                                                      • Part of subcall function 02C68CD4: __getptd_noexit.LIBCMT ref: 02C68CD8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: __getptd_noexit$ExitFilterThreadUserXcpt__amsg_exit__freeptd
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1405322794-0
                                                                                                                    • Opcode ID: 841887e2579f6ba358bbbb1facd448c3f99e3b8cad423500b6c8f8f6540c5723
                                                                                                                    • Instruction ID: 58020ccb05a0839c160a304484b156ecebad966e768bc5a5973ad648d82ac5ee
                                                                                                                    • Opcode Fuzzy Hash: 841887e2579f6ba358bbbb1facd448c3f99e3b8cad423500b6c8f8f6540c5723
                                                                                                                    • Instruction Fuzzy Hash: 7AE08CB0900600AFEB08BBA0C98CE3E37B6AF44302F200188E1029B260CAB49901EF20
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ManagerOpen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1889721586-0
                                                                                                                    • Opcode ID: e14cedbc0feb5c89b6467e96f38c6aff9948a8acb27a2068c57062a81490746d
                                                                                                                    • Instruction ID: 7a51889482eefc0d6445c58c047d4902aff4691aa8b35d8d1f1ab17100afa84d
                                                                                                                    • Opcode Fuzzy Hash: e14cedbc0feb5c89b6467e96f38c6aff9948a8acb27a2068c57062a81490746d
                                                                                                                    • Instruction Fuzzy Hash: 32C012A000A10AEDC6506A110EE89BB21DCE1803483308833A303B20E0C37C4D02F4BF
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateDirectory
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4241100979-0
                                                                                                                    • Opcode ID: 92eeadee0cd59b48c625693de4b53c74f4f210947d4cf4afd91653a1ddec23d2
                                                                                                                    • Instruction ID: 10359bf105b6aaf5a77103108383e6fac2756b183e4ef0df4d138a368c8a52da
                                                                                                                    • Opcode Fuzzy Hash: 92eeadee0cd59b48c625693de4b53c74f4f210947d4cf4afd91653a1ddec23d2
                                                                                                                    • Instruction Fuzzy Hash: 69C0126088E421E2F10222240F8E96E242CA822308B30803BBA03310D3A6FD124322BF
                                                                                                                    APIs
                                                                                                                    • SHGetSpecialFolderPathA.SHELL32 ref: 02CBB28A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c8a000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FolderPathSpecial
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 994120019-0
                                                                                                                    • Opcode ID: aaad39524458018060fc58c248e574bd44314d94ab78790e0d58f2ce556d468f
                                                                                                                    • Instruction ID: c41a6921f1a3de2bec3f797d44a29d636ec4329d7bd105da7f82ec06a04acfc8
                                                                                                                    • Opcode Fuzzy Hash: aaad39524458018060fc58c248e574bd44314d94ab78790e0d58f2ce556d468f
                                                                                                                    • Instruction Fuzzy Hash: 63C012A185C7089BF7673945FC497FBB7249F06202F054524C64E01200BA21AA18C6C7
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C8A000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C8A000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c8a000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3934441357-0
                                                                                                                    • Opcode ID: 1301c200262f4bb8848f5b085dfa4b01f9214cc425e9b01dceb0d695ad94dd1c
                                                                                                                    • Instruction ID: 361c768b2e5e3f5712b5aac15bd320f7772e7379798bb59f6c3d8713c4f61206
                                                                                                                    • Opcode Fuzzy Hash: 1301c200262f4bb8848f5b085dfa4b01f9214cc425e9b01dceb0d695ad94dd1c
                                                                                                                    • Instruction Fuzzy Hash: DBD0C9F0948A40CBC715AF1A94C422CFBA0BB08700F01092DD6D982240C2340498CB42
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CopyFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1304948518-0
                                                                                                                    • Opcode ID: 0e633dfdbee9ef2f688e371e3f67e75e6bc4925a5453bfc56560f6dab2e89eeb
                                                                                                                    • Instruction ID: c41fb53a9bfc467242d307739dca89a3c46ac6fd830d1415ab718f95d74c21df
                                                                                                                    • Opcode Fuzzy Hash: 0e633dfdbee9ef2f688e371e3f67e75e6bc4925a5453bfc56560f6dab2e89eeb
                                                                                                                    • Instruction Fuzzy Hash: 2DB0923124C200D5D5203A140A4D733222CD744741B2CC83B621BB28E1D3BCC09B309F
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C61550: OpenEventA.KERNEL32(00100002,00000000,00000000,EDE8A8DA), ref: 02C615F0
                                                                                                                      • Part of subcall function 02C61550: CloseHandle.KERNEL32(00000000), ref: 02C61605
                                                                                                                      • Part of subcall function 02C61550: ResetEvent.KERNEL32(00000000,EDE8A8DA), ref: 02C6160F
                                                                                                                      • Part of subcall function 02C61550: CloseHandle.KERNEL32(00000000,EDE8A8DA), ref: 02C61644
                                                                                                                    • TlsSetValue.KERNEL32(0000002C,?), ref: 02C620EA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEventHandle$OpenResetValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1556185888-0
                                                                                                                    • Opcode ID: 6116227e9adf3c6e0777ffecdfafc72ed7a849f312a1fcded67ac9ab8096c668
                                                                                                                    • Instruction ID: 79bf92f39b625fd50fbfc3e618e70dc27ddfe4059aec5235d4f1cc1acb863f71
                                                                                                                    • Opcode Fuzzy Hash: 6116227e9adf3c6e0777ffecdfafc72ed7a849f312a1fcded67ac9ab8096c668
                                                                                                                    • Instruction Fuzzy Hash: B401A771A44244AFD710CF58DC49F5ABBACFB05771F10876AF829D3380D77159108AD5
                                                                                                                    APIs
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,0040709C), ref: 0040B7AF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4275171209-0
                                                                                                                    • Opcode ID: 4b13c247f9c908aa5485c84d3c446c0064dd6ec34c368dc42029ef4de7b80641
                                                                                                                    • Instruction ID: 1c2cacd73676f6fc491fe61d533740bf061ba1a3af09dadca8cdf0fe3663b25b
                                                                                                                    • Opcode Fuzzy Hash: 4b13c247f9c908aa5485c84d3c446c0064dd6ec34c368dc42029ef4de7b80641
                                                                                                                    • Instruction Fuzzy Hash: 7BE09232984304BBD7104E618C51F927B59EB88B85F664025FE45272C1C6756826E6FA
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3472027048-0
                                                                                                                    • Opcode ID: 60f5bc632a8b53a518686879de5bf6c0fbf39b412e2b9375836adac3d2055071
                                                                                                                    • Instruction ID: 067b9362fc6996507970f724e82a7531a88fffa401b4ff197c706aef294a2a36
                                                                                                                    • Opcode Fuzzy Hash: 60f5bc632a8b53a518686879de5bf6c0fbf39b412e2b9375836adac3d2055071
                                                                                                                    • Instruction Fuzzy Hash: 08E0657044C645CEC6214714AA19B3A3630FB12300F780437E803B21F7CB7E4842A6CF
                                                                                                                    APIs
                                                                                                                    • lstrcmpiW.KERNEL32(?,/chk), ref: 00402325
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrcmpi
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1586166983-0
                                                                                                                    • Opcode ID: 1eb90276b992977dadd1e5e8244aa7e237b0871661a487ae383d298f91836edb
                                                                                                                    • Instruction ID: 05c8da4ca2490905f04efcf7590c2a29be4a559141535c036c19fc4e0ac481fb
                                                                                                                    • Opcode Fuzzy Hash: 1eb90276b992977dadd1e5e8244aa7e237b0871661a487ae383d298f91836edb
                                                                                                                    • Instruction Fuzzy Hash: 07E0C260906519D5CB206B226A6C1FF66A8E905722361487FE812B29D1E37C40415AFE
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3472027048-0
                                                                                                                    • Opcode ID: 3c2e9c128fc4104ba4a77706678fb7591f75b15e06d1af25ce17b9be863c90a0
                                                                                                                    • Instruction ID: 7a9cd6a43cf003465fe7e78a3cc808b9485612706e75825fdcca54f543c82f1a
                                                                                                                    • Opcode Fuzzy Hash: 3c2e9c128fc4104ba4a77706678fb7591f75b15e06d1af25ce17b9be863c90a0
                                                                                                                    • Instruction Fuzzy Hash: 0ED06771488641EAD6056B506E14A353A31FB06701F284477A506751E2C77E1856AAAF
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3472027048-0
                                                                                                                    • Opcode ID: 772214cd7f75b070f06be04c49063a8d001dbceef2975e446cff47a4e8253bb9
                                                                                                                    • Instruction ID: e214d3a132e34610d6d4fd7af79b7e63b6903babfe4da6ffb42e6c11c01b6428
                                                                                                                    • Opcode Fuzzy Hash: 772214cd7f75b070f06be04c49063a8d001dbceef2975e446cff47a4e8253bb9
                                                                                                                    • Instruction Fuzzy Hash: 79D01270554511AED7449FB8CD8C9B83768E7083417100131E41BD65D0C7759A16ABA9
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3472027048-0
                                                                                                                    • Opcode ID: 598b19c69744822211dc97bc29064c801a8a0982dfebe2bb9a68d70a16741285
                                                                                                                    • Instruction ID: 72a2eb4f9db541d5831bb358bdc3756402e582d94cd61096001421b1c1f4a43a
                                                                                                                    • Opcode Fuzzy Hash: 598b19c69744822211dc97bc29064c801a8a0982dfebe2bb9a68d70a16741285
                                                                                                                    • Instruction Fuzzy Hash: 7CC00270988502DAD6041B61BA15B353A30F705701F345537B607744E68B7E1456BA9F
                                                                                                                    APIs
                                                                                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C608E2
                                                                                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C608EA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFormatLastMessage
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3479602957-0
                                                                                                                    • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                                                                    • Instruction ID: 7969f6b862f9b12c4c0c0c2b114c3a9b49fbb012d5bee768e6af96cce6070a83
                                                                                                                    • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                                                                                                                    • Instruction Fuzzy Hash: 8FF03A70208341DFEB24CE25C895B2EBBE4BBDD754F50092CF596A2191D770E285CB6A
                                                                                                                    APIs
                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,02C64DD6,?,?,?,00000001), ref: 02C6946D
                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 02C69476
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3192549508-0
                                                                                                                    • Opcode ID: 308ef0e0d73ab8185c7f95aaed134036eecee4c7c04848c8255b4a9a9744a885
                                                                                                                    • Instruction ID: 90f6ad015ad1614c4d369e3cb6a0f2473d2fa2541db98a24d824a325cd900c37
                                                                                                                    • Opcode Fuzzy Hash: 308ef0e0d73ab8185c7f95aaed134036eecee4c7c04848c8255b4a9a9744a885
                                                                                                                    • Instruction Fuzzy Hash: 07B0923148420CEBCB012B91EC0DB89BF28FB046A2F004910F60E440508B6254289AE1
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateService
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1592570254-0
                                                                                                                    • Opcode ID: 051d8965c7acb3095dcaf889c923b2df967fd7e4e7eb8282a1476efa22898f35
                                                                                                                    • Instruction ID: 6f8f52b78b8ad1113efb7fb2c5e6c591343ce6d802878e11042b105421479890
                                                                                                                    • Opcode Fuzzy Hash: 051d8965c7acb3095dcaf889c923b2df967fd7e4e7eb8282a1476efa22898f35
                                                                                                                    • Instruction Fuzzy Hash: B6C04C30484015DBCA158F405A5892C3631D65035076284B6D4037A5E0C73D5E56BA8E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                                                    • Instruction ID: 1bfc6e0452c0d88762707384c9c48f1583012ae95b6e960340b76470f4ee8892
                                                                                                                    • Opcode Fuzzy Hash: 50ed358c2bc5baa28b61a63f85c8bcfb39f11c9cdbb9bf2bbec23c38127e8fb6
                                                                                                                    • Instruction Fuzzy Hash: A3F0E2B1904309BAD714DF85D942B9DFBB8EB45310F208129D608A7340E6707A108B94
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C524E6
                                                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 02C524FC
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C5250E
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C5256D
                                                                                                                    • SetLastError.KERNEL32(00000000,?,74DEDFB0), ref: 02C5257F
                                                                                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?,74DEDFB0), ref: 02C52599
                                                                                                                    • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C525A2
                                                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C525F0
                                                                                                                    • InterlockedDecrement.KERNEL32(00000002), ref: 02C5262F
                                                                                                                    • InterlockedExchange.KERNEL32(00000000,00000000), ref: 02C5268E
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C52699
                                                                                                                    • InterlockedExchange.KERNEL32(00000000,00000001), ref: 02C526AD
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,74DEDFB0), ref: 02C526BD
                                                                                                                    • GetLastError.KERNEL32(?,74DEDFB0), ref: 02C526C7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionCriticalQueuedSectionStatus$DecrementEnterH_prologLeavePost
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1213838671-0
                                                                                                                    • Opcode ID: fb41a9e2e609b216114a41686cd293f16157bba783e1d1c9479da3ab186a17fe
                                                                                                                    • Instruction ID: 260b00e68f61e3a643ef0c71b3804a754c928eea2eeb1b69315a42c2976ee67a
                                                                                                                    • Opcode Fuzzy Hash: fb41a9e2e609b216114a41686cd293f16157bba783e1d1c9479da3ab186a17fe
                                                                                                                    • Instruction Fuzzy Hash: 6E612E71900219AFCB11DFA4D988AAEFBF9FF48314F10452AE916E3240D730DA58CFA5
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C54608
                                                                                                                      • Part of subcall function 02C63A8F: _malloc.LIBCMT ref: 02C63AA7
                                                                                                                    • htons.WS2_32(?), ref: 02C54669
                                                                                                                    • htonl.WS2_32(?), ref: 02C5468C
                                                                                                                    • htonl.WS2_32(00000000), ref: 02C54693
                                                                                                                    • htons.WS2_32(00000000), ref: 02C54747
                                                                                                                    • _sprintf.LIBCMT ref: 02C5475D
                                                                                                                      • Part of subcall function 02C588C3: _memmove.LIBCMT ref: 02C588E3
                                                                                                                    • htons.WS2_32(?), ref: 02C546B0
                                                                                                                      • Part of subcall function 02C5966E: __EH_prolog.LIBCMT ref: 02C59673
                                                                                                                      • Part of subcall function 02C5966E: RtlEnterCriticalSection.NTDLL(00000020), ref: 02C596EE
                                                                                                                      • Part of subcall function 02C5966E: RtlLeaveCriticalSection.NTDLL(00000020), ref: 02C5970C
                                                                                                                      • Part of subcall function 02C51BA7: __EH_prolog.LIBCMT ref: 02C51BAC
                                                                                                                      • Part of subcall function 02C51BA7: RtlEnterCriticalSection.NTDLL ref: 02C51BBC
                                                                                                                      • Part of subcall function 02C51BA7: RtlLeaveCriticalSection.NTDLL ref: 02C51BEA
                                                                                                                      • Part of subcall function 02C51BA7: RtlEnterCriticalSection.NTDLL ref: 02C51C13
                                                                                                                      • Part of subcall function 02C51BA7: RtlLeaveCriticalSection.NTDLL ref: 02C51C56
                                                                                                                      • Part of subcall function 02C5DE2A: __EH_prolog.LIBCMT ref: 02C5DE2F
                                                                                                                    • htonl.WS2_32(?), ref: 02C5497C
                                                                                                                    • htonl.WS2_32(00000000), ref: 02C54983
                                                                                                                    • htonl.WS2_32(00000000), ref: 02C549C8
                                                                                                                    • htonl.WS2_32(00000000), ref: 02C549CF
                                                                                                                    • htons.WS2_32(?), ref: 02C549EF
                                                                                                                    • htons.WS2_32(?), ref: 02C549F9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSectionhtonl$htons$H_prolog$EnterLeave$_malloc_memmove_sprintf
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1645262487-0
                                                                                                                    • Opcode ID: 867bb10103c7dba65bb38ac7ca1950db54345122386176cf8b20f8182226f696
                                                                                                                    • Instruction ID: 5a85a0311abdd3b8e40b66fa597da16d9c4504d6d7da591d98cc9ec1bb224d79
                                                                                                                    • Opcode Fuzzy Hash: 867bb10103c7dba65bb38ac7ca1950db54345122386176cf8b20f8182226f696
                                                                                                                    • Instruction Fuzzy Hash: E7023971D00269EEDF15DFA4C844BEEBBB9AF08304F10455AE905B7280DB749A88DFA5
                                                                                                                    APIs
                                                                                                                    • RegisterServiceCtrlHandlerA.ADVAPI32(Edrax Smart Maker 9.28.43,0040235E), ref: 004023C1
                                                                                                                    • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402420
                                                                                                                    • GetLastError.KERNEL32 ref: 00402422
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0040242F
                                                                                                                    • GetLastError.KERNEL32 ref: 00402450
                                                                                                                    • SetServiceStatus.ADVAPI32(0040A0E0), ref: 00402480
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000022CB,00000000,00000000,00000000), ref: 0040248C
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00402495
                                                                                                                    • CloseHandle.KERNEL32 ref: 004024A1
                                                                                                                    • SetServiceStatus.ADVAPI32(0040A0E0), ref: 004024CA
                                                                                                                    Strings
                                                                                                                    • Edrax Smart Maker 9.28.43, xrefs: 004023BC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$Status$CreateErrorLast$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                                                                                                                    • String ID: Edrax Smart Maker 9.28.43
                                                                                                                    • API String ID: 3346042915-3805296873
                                                                                                                    • Opcode ID: 0bac2955eb8625cf60f76f4bbfe82ce878a41a6c6cb59ed4d7ea205cd266c3a3
                                                                                                                    • Instruction ID: e607d343a15970cd44bf33002b1e5153504bc9bcaf452d951a8c8a09ef4d4640
                                                                                                                    • Opcode Fuzzy Hash: 0bac2955eb8625cf60f76f4bbfe82ce878a41a6c6cb59ed4d7ea205cd266c3a3
                                                                                                                    • Instruction Fuzzy Hash: 56211970441309EBD210DF16EF49E567FB8EB85754710C03BE206B22B1D7BA0465EB2E
                                                                                                                    APIs
                                                                                                                    • RtlDecodePointer.NTDLL(?), ref: 02C6827A
                                                                                                                    • _free.LIBCMT ref: 02C68293
                                                                                                                      • Part of subcall function 02C62EB4: HeapFree.KERNEL32(00000000,00000000,?,02C65C12,00000000,00000104,74DF0A60), ref: 02C62EC8
                                                                                                                      • Part of subcall function 02C62EB4: GetLastError.KERNEL32(00000000,?,02C65C12,00000000,00000104,74DF0A60), ref: 02C62EDA
                                                                                                                    • _free.LIBCMT ref: 02C682A6
                                                                                                                    • _free.LIBCMT ref: 02C682C4
                                                                                                                    • _free.LIBCMT ref: 02C682D6
                                                                                                                    • _free.LIBCMT ref: 02C682E7
                                                                                                                    • _free.LIBCMT ref: 02C682F2
                                                                                                                    • _free.LIBCMT ref: 02C68316
                                                                                                                    • RtlEncodePointer.NTDLL(00AB1C40), ref: 02C6831D
                                                                                                                    • _free.LIBCMT ref: 02C68332
                                                                                                                    • _free.LIBCMT ref: 02C68348
                                                                                                                    • _free.LIBCMT ref: 02C68370
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3064303923-0
                                                                                                                    • Opcode ID: e55d6fc874f46cee6c256cc925d10eb4e85f81c3c5523b4e1fef0d9c440c2eaf
                                                                                                                    • Instruction ID: 5ad1f2c9160beac00ed879a8c96812dc497fab454bfb8adf38eb78abc10b059d
                                                                                                                    • Opcode Fuzzy Hash: e55d6fc874f46cee6c256cc925d10eb4e85f81c3c5523b4e1fef0d9c440c2eaf
                                                                                                                    • Instruction Fuzzy Hash: 0021D632C412509FCB255F55FCC87367769AB847223298B3BDC0497240CB349D69DF99
                                                                                                                    APIs
                                                                                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035B9
                                                                                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035CD
                                                                                                                    • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 004035F9
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403631
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00402DE4), ref: 00403653
                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00402DE4), ref: 0040366C
                                                                                                                    • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00402DE4), ref: 0040367F
                                                                                                                    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 004036BD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                                                    • String ID: -@
                                                                                                                    • API String ID: 1823725401-2999422947
                                                                                                                    • Opcode ID: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                                                                    • Instruction ID: a052efc5f8264b04540ba139265ff63877c4dc4e75c0ae38b6650f7b3518fcca
                                                                                                                    • Opcode Fuzzy Hash: d09c44be7b725e9416f1bbabc7ff939c5033ef1a694eb4ed66286c613d9d8241
                                                                                                                    • Instruction Fuzzy Hash: 7A31F0B24042217EDB303F785C8883B7E9CE64574A7120D3BF542E3390E67A8E814AAD
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C53428
                                                                                                                    • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx), ref: 02C5346B
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02C53472
                                                                                                                    • GetLastError.KERNEL32 ref: 02C53486
                                                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 02C534D7
                                                                                                                    • RtlEnterCriticalSection.NTDLL(00000018), ref: 02C534ED
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(00000018), ref: 02C53518
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$AddressCompareEnterErrorExchangeH_prologHandleInterlockedLastLeaveModuleProc
                                                                                                                    • String ID: CancelIoEx$KERNEL32
                                                                                                                    • API String ID: 2902213904-434325024
                                                                                                                    • Opcode ID: c3953ee22f05458473bde97f66a605f8ef5f1e98ecad34c38df66fb714f75129
                                                                                                                    • Instruction ID: 153a6801a50b0456a31639c90e29725e3fdd2d455254b72e98363189e154627c
                                                                                                                    • Opcode Fuzzy Hash: c3953ee22f05458473bde97f66a605f8ef5f1e98ecad34c38df66fb714f75129
                                                                                                                    • Instruction Fuzzy Hash: 47319071900259DFDB02DF64C884B6ABBF9FF89350F0045A9E815AB241D770D955CFA1
                                                                                                                    APIs
                                                                                                                    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403D7D,?,Microsoft Visual C++ Runtime Library,00012010,?,00406528,?,00406578,?,?,?,Runtime Error!Program: ), ref: 0040541A
                                                                                                                    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405432
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405443
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405450
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                                    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xe@
                                                                                                                    • API String ID: 2238633743-4073082454
                                                                                                                    • Opcode ID: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                                                                    • Instruction ID: 002c49bf34bfddc632f277928187d9a53126bd14f393e8a72b926efab3457658
                                                                                                                    • Opcode Fuzzy Hash: c1c5459b902c6d691e26e6f6b3d5bc075fbf46770f4929c54e66e674ea662e67
                                                                                                                    • Instruction Fuzzy Hash: E1018431740705AFC7109FB4AD80E6B7AE9FB48791309843BB955F22A1D778C860CF69
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403CC6
                                                                                                                    • GetStdHandle.KERNEL32(000000F4,00406528,00000000,?,00000000,00000000), ref: 00403D9C
                                                                                                                    • WriteFile.KERNEL32(00000000), ref: 00403DA3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$HandleModuleNameWrite
                                                                                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $r@
                                                                                                                    • API String ID: 3784150691-1191147370
                                                                                                                    • Opcode ID: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                                                                    • Instruction ID: 901e413bd7d296cb1b0b97d790854a8d5494ec17f79a926850544caa0371b074
                                                                                                                    • Opcode Fuzzy Hash: d598713df4d839de7fd74915155ccdeaa4efa499b3dc35e679589c6eb5dc5418
                                                                                                                    • Instruction Fuzzy Hash: F831C772A04208AEEF20EF60DE49F9A776CEF45304F1004BBF545F61C1D6B8AA858A59
                                                                                                                    APIs
                                                                                                                    • LCMapStringW.KERNEL32(00000000,00000100,004065F4,00000001,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 00405917
                                                                                                                    • LCMapStringA.KERNEL32(00000000,00000100,004065F0,00000001,00000000,00000000,?,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405933
                                                                                                                    • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,004051A5,?,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 0040597C
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,004051A5,00200020,00000000,?,00000000,00000000), ref: 004059B4
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A0C
                                                                                                                    • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405A22
                                                                                                                    • LCMapStringW.KERNEL32(00000000,?,004051A5,00000000,004051A5,?,?,004051A5,00200020,00000000,?,00000000), ref: 00405A55
                                                                                                                    • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,004051A5,00200020,00000000,?,00000000), ref: 00405ABD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: String$ByteCharMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 352835431-0
                                                                                                                    • Opcode ID: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                                                                    • Instruction ID: ad677ee5f46337090c489763c5b1535e0d4a7e7cc2f37d679e5ddd81b555dfe6
                                                                                                                    • Opcode Fuzzy Hash: 6e7e0904aad4ffb7df7fa70090622cd283316a6a4d1fe7c3c07164d91eefa06b
                                                                                                                    • Instruction Fuzzy Hash: 8B516C71A00609EFCF218FA5DD85A9F7FB5FB48750F14422AF911B21A0D3398921DF69
                                                                                                                    APIs
                                                                                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,EDE8A8DA), ref: 02C615F0
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C61605
                                                                                                                    • ResetEvent.KERNEL32(00000000,EDE8A8DA), ref: 02C6160F
                                                                                                                    • CloseHandle.KERNEL32(00000000,EDE8A8DA), ref: 02C61644
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,EDE8A8DA), ref: 02C616BA
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C616CF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEventHandle$CreateOpenReset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1285874450-0
                                                                                                                    • Opcode ID: 5928936b3bf920a430852f0bae82e62a1e6321619f04bba47d4da30406a61572
                                                                                                                    • Instruction ID: f3042f7e1fe06b116803217e434d8dce43256c711fc7823dfbd99d6f942786fe
                                                                                                                    • Opcode Fuzzy Hash: 5928936b3bf920a430852f0bae82e62a1e6321619f04bba47d4da30406a61572
                                                                                                                    • Instruction Fuzzy Hash: D9413074D043589FDF20CFA5C989BADBBB8EF45725F184619E419EB380D7709A05CB90
                                                                                                                    APIs
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C520AC
                                                                                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C520CD
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C520D8
                                                                                                                    • InterlockedDecrement.KERNEL32(?), ref: 02C5213E
                                                                                                                    • GetQueuedCompletionStatus.KERNEL32(?,?,?,?,000001F4,?), ref: 02C5217A
                                                                                                                    • InterlockedDecrement.KERNEL32(?), ref: 02C52187
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C521A6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1171374749-0
                                                                                                                    • Opcode ID: 5e8d7b7c807eb61409760ebdb29d268fc6359f227e77a1402cb9237df120610a
                                                                                                                    • Instruction ID: f5f5a3ba9053b95c91c0529fea087278fcb790bfaddc42acbd16f92fef237ed8
                                                                                                                    • Opcode Fuzzy Hash: 5e8d7b7c807eb61409760ebdb29d268fc6359f227e77a1402cb9237df120610a
                                                                                                                    • Instruction Fuzzy Hash: EF4137715047059FC321DF25D888A6BBBF9FFC8654F004A2EF89A82650D730E949CFA6
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C61E10: OpenEventA.KERNEL32(00100002,00000000,?,?,?,02C6166E,?,?), ref: 02C61E3F
                                                                                                                      • Part of subcall function 02C61E10: CloseHandle.KERNEL32(00000000,?,?,02C6166E,?,?), ref: 02C61E54
                                                                                                                      • Part of subcall function 02C61E10: SetEvent.KERNEL32(00000000,02C6166E,?,?), ref: 02C61E67
                                                                                                                    • OpenEventA.KERNEL32(00100002,00000000,00000000,EDE8A8DA), ref: 02C615F0
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C61605
                                                                                                                    • ResetEvent.KERNEL32(00000000,EDE8A8DA), ref: 02C6160F
                                                                                                                    • CloseHandle.KERNEL32(00000000,EDE8A8DA), ref: 02C61644
                                                                                                                    • __CxxThrowException@8.LIBCMT ref: 02C61675
                                                                                                                      • Part of subcall function 02C6449A: RaiseException.KERNEL32(?,?,02C5FA96,?,?,?,?,?,?,?,02C5FA96,?,02C80F78,?), ref: 02C644EF
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,EDE8A8DA), ref: 02C616BA
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C616CF
                                                                                                                      • Part of subcall function 02C61B50: GetCurrentProcessId.KERNEL32(?), ref: 02C61BA9
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,EDE8A8DA), ref: 02C616DF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2227236058-0
                                                                                                                    • Opcode ID: 34314d086c5b0a93832b8220469eb6f44b378c21a59aaaf93a0f4c1ce3e54ad3
                                                                                                                    • Instruction ID: 98eedf05d0061edca964979e6fc84bf3f3f5422242a163fa1519329519256f00
                                                                                                                    • Opcode Fuzzy Hash: 34314d086c5b0a93832b8220469eb6f44b378c21a59aaaf93a0f4c1ce3e54ad3
                                                                                                                    • Instruction Fuzzy Hash: 7F315E75D003489BDF20CBA5CC89BBDB7B9EF45316F180229E81DEB380E7A0DA158B51
                                                                                                                    APIs
                                                                                                                    • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00403A36), ref: 00404639
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00403A36), ref: 0040465D
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00403A36), ref: 00404677
                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00403A36), ref: 00404738
                                                                                                                    • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00403A36), ref: 0040474F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocVirtual$FreeHeap
                                                                                                                    • String ID: r@$r@
                                                                                                                    • API String ID: 714016831-1712950306
                                                                                                                    • Opcode ID: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                                                                    • Instruction ID: 6d2ae56a8b2e66d9b660bb9c1c671dd7469dd609f739855ae4ec176a3c74651c
                                                                                                                    • Opcode Fuzzy Hash: 6146d640eca2786615fae02a601f05dd2cfcbd8d5d5bc8993479f9a7be96b628
                                                                                                                    • Instruction Fuzzy Hash: 3531BEB0940702ABD3309F24DD44B66B7A4EB86755F11463BF265BB2D0E7B8A8418B4D
                                                                                                                    APIs
                                                                                                                    • __init_pointers.LIBCMT ref: 02C65CD4
                                                                                                                      • Part of subcall function 02C68442: RtlEncodePointer.NTDLL(00000000), ref: 02C68445
                                                                                                                      • Part of subcall function 02C68442: __initp_misc_winsig.LIBCMT ref: 02C68460
                                                                                                                      • Part of subcall function 02C68442: GetModuleHandleW.KERNEL32(kernel32.dll,?,02C81578,00000008,00000003,02C80F5C,?,00000001), ref: 02C691C1
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 02C691D5
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 02C691E8
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 02C691FB
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 02C6920E
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 02C69221
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 02C69234
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 02C69247
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 02C6925A
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 02C6926D
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 02C69280
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 02C69293
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 02C692A6
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 02C692B9
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 02C692CC
                                                                                                                      • Part of subcall function 02C68442: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 02C692DF
                                                                                                                    • __mtinitlocks.LIBCMT ref: 02C65CD9
                                                                                                                    • __mtterm.LIBCMT ref: 02C65CE2
                                                                                                                      • Part of subcall function 02C65D4A: RtlDeleteCriticalSection.NTDLL(00000000), ref: 02C68878
                                                                                                                      • Part of subcall function 02C65D4A: _free.LIBCMT ref: 02C6887F
                                                                                                                      • Part of subcall function 02C65D4A: RtlDeleteCriticalSection.NTDLL(02C83978), ref: 02C688A1
                                                                                                                    • __calloc_crt.LIBCMT ref: 02C65D07
                                                                                                                    • __initptd.LIBCMT ref: 02C65D29
                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 02C65D30
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3567560977-0
                                                                                                                    • Opcode ID: 99a87271047ccd4967a2799b03b6c822acec49a223d351b5fc926832a427c340
                                                                                                                    • Instruction ID: 3d3c80e7f050c7706675d6d30b19cde77dec395f845e88535c053cf1f8de6230
                                                                                                                    • Opcode Fuzzy Hash: 99a87271047ccd4967a2799b03b6c822acec49a223d351b5fc926832a427c340
                                                                                                                    • Instruction Fuzzy Hash: DFF024325587116EE22436B87DCE37A2787DF417B0B700B29E050CA0C0FF3188416951
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,?,02C633B6,00000000), ref: 02C6341E
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02C63425
                                                                                                                    • RtlEncodePointer.NTDLL(00000000), ref: 02C63431
                                                                                                                    • RtlDecodePointer.NTDLL(00000001), ref: 02C6344E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                                                    • String ID: RoInitialize$combase.dll
                                                                                                                    • API String ID: 3489934621-340411864
                                                                                                                    • Opcode ID: 690f6455f07e9bdef6b81aef3c6414e33ae1e2135fbcead3fd88437b66cefb9d
                                                                                                                    • Instruction ID: 63eb9c459132504335952562d6ca57383476a226dae5cb8e94087c041782e679
                                                                                                                    • Opcode Fuzzy Hash: 690f6455f07e9bdef6b81aef3c6414e33ae1e2135fbcead3fd88437b66cefb9d
                                                                                                                    • Instruction Fuzzy Hash: 70E0E570ED0344ABEB205F71AD8DB267A69AB40B46F608A60F10AD7180CBB5416C9F59
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,02C633F3), ref: 02C634F3
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 02C634FA
                                                                                                                    • RtlEncodePointer.NTDLL(00000000), ref: 02C63505
                                                                                                                    • RtlDecodePointer.NTDLL(02C633F3), ref: 02C63520
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                                                    • String ID: RoUninitialize$combase.dll
                                                                                                                    • API String ID: 3489934621-2819208100
                                                                                                                    • Opcode ID: e11eb413158f49a2046ab2eb35fcfe09e5cb15ae976ec6865337011cd280c073
                                                                                                                    • Instruction ID: fb92fb45dbd94c0a76885b8a34dd2b5c420713046fa1e5aef6ce8e81068967e0
                                                                                                                    • Opcode Fuzzy Hash: e11eb413158f49a2046ab2eb35fcfe09e5cb15ae976ec6865337011cd280c073
                                                                                                                    • Instruction Fuzzy Hash: 1BE0BF70DD0304ABEB705F70AC0DB167B69B74470AF204A64F206E6144CB78512C9B5D
                                                                                                                    APIs
                                                                                                                    • TlsGetValue.KERNEL32(0000002C,EDE8A8DA,?,?,?,?,00000000,02C769F8,000000FF,02C6210A), ref: 02C61EAA
                                                                                                                    • TlsSetValue.KERNEL32(0000002C,02C6210A,?,?,00000000), ref: 02C61F17
                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 02C61F41
                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 02C61F44
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: HeapValue$FreeProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1812714009-0
                                                                                                                    • Opcode ID: b0b0c7693d4a5abb1cfc7e4f1acd67d54b1a6e21ad97deafa4f1b66aeb3f1102
                                                                                                                    • Instruction ID: e28beb7f488bef4b53572d55164a2fa0046217d11628bb7df6442baaf6340e50
                                                                                                                    • Opcode Fuzzy Hash: b0b0c7693d4a5abb1cfc7e4f1acd67d54b1a6e21ad97deafa4f1b66aeb3f1102
                                                                                                                    • Instruction Fuzzy Hash: CE51AD31A042489FDB20CF69C88CB26BBE4FB85765F198658F85DD7380D7B1E904CB92
                                                                                                                    APIs
                                                                                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 02C756D0
                                                                                                                    • __FindPESection.LIBCMT ref: 02C756EA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: FindHandlersScopeSectionTableValidate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 876702719-0
                                                                                                                    • Opcode ID: d2bbcb85dade07a8a1863a26f5f8f4c9f503da7d4d616894a40aa8e63c1448ea
                                                                                                                    • Instruction ID: 2174042fc9ae9da07b4a3bd7770524aa3eb950273a814ce16451f89ea52101dd
                                                                                                                    • Opcode Fuzzy Hash: d2bbcb85dade07a8a1863a26f5f8f4c9f503da7d4d616894a40aa8e63c1448ea
                                                                                                                    • Instruction Fuzzy Hash: EAA1AFB5E40615CFDB24CF58D880BADB7A5FB843A4FA48669DC19A7340E731ED05CB90
                                                                                                                    APIs
                                                                                                                    • GetStringTypeW.KERNEL32(00000001,004065F4,00000001,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405B63
                                                                                                                    • GetStringTypeA.KERNEL32(00000000,00000001,004065F0,00000001,?,?,00000000,00000000,00000001), ref: 00405B7D
                                                                                                                    • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BB1
                                                                                                                    • MultiByteToWideChar.KERNEL32(004051A5,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,004051A5,00200020,00000000,?,00000000,00000000,00000001), ref: 00405BE9
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C3F
                                                                                                                    • GetStringTypeW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405C51
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: StringType$ByteCharMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3852931651-0
                                                                                                                    • Opcode ID: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                                                                    • Instruction ID: b73683cf29d179dc30ac0dacbc12c8afa3e963ef4805c6be7b54428ebd0f8a91
                                                                                                                    • Opcode Fuzzy Hash: d4209c6b3d3c9ca3d0b98124627720af5477d93fa3c81dc5f6dd6a722f71754a
                                                                                                                    • Instruction Fuzzy Hash: 1E417B71500609EFDF219F94DD86AAF7F79EB05750F10443AFA12B6290C339A960CBA9
                                                                                                                    APIs
                                                                                                                    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02C51CB1
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 02C51CBA
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(02C87244,00000000), ref: 02C51CC6
                                                                                                                    • TerminateThread.KERNEL32(?,00000000), ref: 02C51CD4
                                                                                                                    • QueueUserAPC.KERNEL32(02C51E7C,?,00000000), ref: 02C51CE1
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02C51CEC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1946104331-0
                                                                                                                    • Opcode ID: 71f71273a3fa24d2d4b83c1bd40d622fbe36581718a20db3e46e1dd306fd0f92
                                                                                                                    • Instruction ID: 5124220140ea63b16bb1879aa5bacfbd2035f73188e87f3254c231804d50a4a7
                                                                                                                    • Opcode Fuzzy Hash: 71f71273a3fa24d2d4b83c1bd40d622fbe36581718a20db3e46e1dd306fd0f92
                                                                                                                    • Instruction Fuzzy Hash: B8F0A431540218BFDB105B96DD0DE57FFBCFB85720B00475DF52A82190DBB1A918CBA0
                                                                                                                    APIs
                                                                                                                    • GetVersionExA.KERNEL32 ref: 004038C7
                                                                                                                    • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 004038FC
                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040395C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                                                    • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                                                    • API String ID: 1385375860-4131005785
                                                                                                                    • Opcode ID: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                                                                    • Instruction ID: dfbe321087950a958f1f5ebe55e663b38e75b845a74228cdfb1d658b51cb0ff2
                                                                                                                    • Opcode Fuzzy Hash: 476567a857e94c6b60ab0a2bb3643b3ab9519d2bf8b3118ed803bebf3e2b5968
                                                                                                                    • Instruction Fuzzy Hash: A53127B29052446DEB319A705C46BDF3F6C9B02305F2400FBD185F52C2D2B99F85CB18
                                                                                                                    APIs
                                                                                                                    • std::exception::exception.LIBCMT ref: 02C618BF
                                                                                                                      • Part of subcall function 02C62413: std::exception::_Copy_str.LIBCMT ref: 02C6242C
                                                                                                                      • Part of subcall function 02C60C90: __CxxThrowException@8.LIBCMT ref: 02C60CEE
                                                                                                                    • std::exception::exception.LIBCMT ref: 02C6191E
                                                                                                                    Strings
                                                                                                                    • $, xrefs: 02C61923
                                                                                                                    • boost unique_lock owns already the mutex, xrefs: 02C6190D
                                                                                                                    • boost unique_lock has no mutex, xrefs: 02C618AE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                                                                                                                    • String ID: $$boost unique_lock has no mutex$boost unique_lock owns already the mutex
                                                                                                                    • API String ID: 2140441600-46888669
                                                                                                                    • Opcode ID: 962729f0367e15184777cca7cfd6a8b226dc1bf74a74a071172aaf918ca9c1be
                                                                                                                    • Instruction ID: 1e2963f16a274bb1062b83f6cd24e5f9a4d1df21653df06b95297975c3ddec34
                                                                                                                    • Opcode Fuzzy Hash: 962729f0367e15184777cca7cfd6a8b226dc1bf74a74a071172aaf918ca9c1be
                                                                                                                    • Instruction Fuzzy Hash: 092117B15087809FD720DF24C588B6BBBE9BB88B08F144E5DF4A597380D7B59408DF92
                                                                                                                    APIs
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52350
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52360
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C52370
                                                                                                                    • GetLastError.KERNEL32 ref: 02C5237A
                                                                                                                      • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                                                                                                                    • String ID: pqcs
                                                                                                                    • API String ID: 1619523792-2559862021
                                                                                                                    • Opcode ID: 6b6367ffa622cb13f536f8f42cf31dccebc8d2de147fc7648d70a1dba1bfd70c
                                                                                                                    • Instruction ID: 6ddab218515db2fece8d2e26535a7d9d3e486b61dca2cc638b673a81c4af9243
                                                                                                                    • Opcode Fuzzy Hash: 6b6367ffa622cb13f536f8f42cf31dccebc8d2de147fc7648d70a1dba1bfd70c
                                                                                                                    • Instruction Fuzzy Hash: 6EF05470940318AFD710AF749C09FABBBECFB40601F004669EC09D3140E771DA589B91
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C54035
                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 02C54042
                                                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 02C54049
                                                                                                                    • std::exception::exception.LIBCMT ref: 02C54063
                                                                                                                      • Part of subcall function 02C5A601: __EH_prolog.LIBCMT ref: 02C5A606
                                                                                                                      • Part of subcall function 02C5A601: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C5A615
                                                                                                                      • Part of subcall function 02C5A601: __CxxThrowException@8.LIBCMT ref: 02C5A634
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prologHeap$AllocateConcurrency::cancellation_token::_Exception@8FromImplProcessThrowstd::exception::exception
                                                                                                                    • String ID: bad allocation
                                                                                                                    • API String ID: 3112922283-2104205924
                                                                                                                    • Opcode ID: 7533620b97232eeec330aea0125e4a5430d97e759903b6d890f56c052b0e158f
                                                                                                                    • Instruction ID: 37557a4f8483f01e489441f1011daaa5285c85265b24cdd2062ed15fed71fb72
                                                                                                                    • Opcode Fuzzy Hash: 7533620b97232eeec330aea0125e4a5430d97e759903b6d890f56c052b0e158f
                                                                                                                    • Instruction Fuzzy Hash: A4F05EB1D442099BCB00EFE0C808BAFBB78FB04340F404645E914A2240DB3552188B91
                                                                                                                    APIs
                                                                                                                    • GetStartupInfoA.KERNEL32(?), ref: 00403729
                                                                                                                    • GetFileType.KERNEL32(00000800), ref: 004037CF
                                                                                                                    • GetStdHandle.KERNEL32(-000000F6), ref: 00403828
                                                                                                                    • GetFileType.KERNEL32(00000000), ref: 00403836
                                                                                                                    • SetHandleCount.KERNEL32 ref: 0040386D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileHandleType$CountInfoStartup
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1710529072-0
                                                                                                                    • Opcode ID: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                                                                    • Instruction ID: 340931fb5571d0dd89e9413526c141aa1936fc067e7847d678db743c6b9c99aa
                                                                                                                    • Opcode Fuzzy Hash: 1ce75c326bde2c2d02afe177aeb4995e441bbd179d01f1070c3041f2ee44749b
                                                                                                                    • Instruction Fuzzy Hash: A65136B25003508BD7209F28CD48B563FE8EB01336F19C67AE492EB2E1C738C955C75A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C61990: CloseHandle.KERNEL32(00000000,EDE8A8DA), ref: 02C619E1
                                                                                                                      • Part of subcall function 02C61990: WaitForSingleObject.KERNEL32(?,000000FF,EDE8A8DA,?,?,?,?,EDE8A8DA,02C61963,EDE8A8DA), ref: 02C619F8
                                                                                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C61C5E
                                                                                                                    • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 02C61C7E
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 02C61CB7
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 02C61D0B
                                                                                                                    • SetEvent.KERNEL32(?), ref: 02C61D12
                                                                                                                      • Part of subcall function 02C5418C: CloseHandle.KERNEL32(00000000,?,02C61C45), ref: 02C541B0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4166353394-0
                                                                                                                    • Opcode ID: ead9ded97f337dc01f0b9423e7ddff24d275527643925b05f02d80c18ed6dc7a
                                                                                                                    • Instruction ID: 7f05c8db140182a928b729dde96c335315a225c7432cfbddc65c423e7c800354
                                                                                                                    • Opcode Fuzzy Hash: ead9ded97f337dc01f0b9423e7ddff24d275527643925b05f02d80c18ed6dc7a
                                                                                                                    • Instruction Fuzzy Hash: 4A41EF706007019BDB268F28CCC8B2AB7A5EF85725F280668EC18DB391D775D9059BE5
                                                                                                                    APIs
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C520AC
                                                                                                                    • SetWaitableTimer.KERNEL32(00000000,?,00000001,00000000,00000000,00000000), ref: 02C520CD
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C520D8
                                                                                                                    • InterlockedDecrement.KERNEL32(?), ref: 02C5213E
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C521A6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Interlocked$Exchange$DecrementTimerWaitable
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1611172436-0
                                                                                                                    • Opcode ID: 7d243112bff39bcf39caf00955e76e2e2979ed6e1346e3e7dea7bd12a48eec9a
                                                                                                                    • Instruction ID: 8e9895eb271235e6c1906de5d9c1534ca09e7c1753a2cc0f96f09c8fa0af52c3
                                                                                                                    • Opcode Fuzzy Hash: 7d243112bff39bcf39caf00955e76e2e2979ed6e1346e3e7dea7bd12a48eec9a
                                                                                                                    • Instruction Fuzzy Hash: A1317A725047059FC315CF25C884A6BBBF9FFC8664F040A2EE85683650D730E989CB96
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5E034
                                                                                                                      • Part of subcall function 02C51A01: TlsGetValue.KERNEL32 ref: 02C51A0A
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C5E0B3
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C5E0CF
                                                                                                                    • InterlockedIncrement.KERNEL32(02C85180), ref: 02C5E0F4
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C5E109
                                                                                                                      • Part of subcall function 02C527F3: SetWaitableTimer.KERNEL32(00000000,?,000493E0,00000000,00000000,00000000,00000000,00000000,0000000A,00000000), ref: 02C5284E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalInterlockedSection$EnterExchangeH_prologIncrementLeaveTimerValueWaitable
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1578506061-0
                                                                                                                    • Opcode ID: 977f05ca5056f78f07b0ce59ac16c86a6fbcdf64499d49827b84765e0c149910
                                                                                                                    • Instruction ID: 410522c6e98cc4da08c25c418a461aec71593037fca8244e59a48b942437d284
                                                                                                                    • Opcode Fuzzy Hash: 977f05ca5056f78f07b0ce59ac16c86a6fbcdf64499d49827b84765e0c149910
                                                                                                                    • Instruction Fuzzy Hash: E73158B1801718DFCB10DFA9C448AAEBBF8BF48310F04455EE849D7601E774A648DFA4
                                                                                                                    APIs
                                                                                                                    • _malloc.LIBCMT ref: 02C702F0
                                                                                                                      • Part of subcall function 02C62EEC: __FF_MSGBANNER.LIBCMT ref: 02C62F03
                                                                                                                      • Part of subcall function 02C62EEC: __NMSG_WRITE.LIBCMT ref: 02C62F0A
                                                                                                                      • Part of subcall function 02C62EEC: RtlAllocateHeap.NTDLL(00A20000,00000000,00000001), ref: 02C62F2F
                                                                                                                    • _free.LIBCMT ref: 02C70303
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocateHeap_free_malloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1020059152-0
                                                                                                                    • Opcode ID: 8662bfe010a03265be88a14b2d61b0154995aec9e2969699102d0596407293b9
                                                                                                                    • Instruction ID: 6747c3e3b2ed55db0ea9570eed839e7070f0ea993f62f35cd97fd11d9c20f595
                                                                                                                    • Opcode Fuzzy Hash: 8662bfe010a03265be88a14b2d61b0154995aec9e2969699102d0596407293b9
                                                                                                                    • Instruction Fuzzy Hash: D811E572908616ABDB202F74ED8C77A3B99AF443A1F204A26F95D9A1D0DB30C650DBD0
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C521DA
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C521ED
                                                                                                                    • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,00000001), ref: 02C52224
                                                                                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,00000001), ref: 02C52237
                                                                                                                    • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02C52261
                                                                                                                      • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52350
                                                                                                                      • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52360
                                                                                                                      • Part of subcall function 02C52341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C52370
                                                                                                                      • Part of subcall function 02C52341: GetLastError.KERNEL32 ref: 02C5237A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1856819132-0
                                                                                                                    • Opcode ID: a0e6a1b314ddf3854b5e03f397aec688cd4aa4baa37d7a4fe4cdf3462ce47a38
                                                                                                                    • Instruction ID: 1abf265f8a04983f8bfae72f2b717ead40f471f2fbc3f9a99e83b1932195d83b
                                                                                                                    • Opcode Fuzzy Hash: a0e6a1b314ddf3854b5e03f397aec688cd4aa4baa37d7a4fe4cdf3462ce47a38
                                                                                                                    • Instruction Fuzzy Hash: D3118475D44128DBCB019FA4DC44ABEFBBAFF44320F10462AEC1592260D7718699DBC6
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5229D
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C522B0
                                                                                                                    • TlsGetValue.KERNEL32 ref: 02C522E7
                                                                                                                    • TlsSetValue.KERNEL32(?), ref: 02C52300
                                                                                                                    • TlsSetValue.KERNEL32(?,?,?), ref: 02C5231C
                                                                                                                      • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52350
                                                                                                                      • Part of subcall function 02C52341: InterlockedExchange.KERNEL32(?,00000001), ref: 02C52360
                                                                                                                      • Part of subcall function 02C52341: PostQueuedCompletionStatus.KERNEL32(00000000,00000000,00000000,00000000), ref: 02C52370
                                                                                                                      • Part of subcall function 02C52341: GetLastError.KERNEL32 ref: 02C5237A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExchangeInterlockedValue$CompletionErrorH_prologLastPostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1856819132-0
                                                                                                                    • Opcode ID: 70210725647aac8c18b09bd64bd953ba53ffe65a35ecfc95c594efcf8414d268
                                                                                                                    • Instruction ID: 6ca1936c8f3998cc01fce51fda019e5a7ff8c80fb3a37fabfab0264963e96c62
                                                                                                                    • Opcode Fuzzy Hash: 70210725647aac8c18b09bd64bd953ba53ffe65a35ecfc95c594efcf8414d268
                                                                                                                    • Instruction Fuzzy Hash: 05115E75D00128DBCB01AFA5DC44AAEFBBAFF44310F10452AEC04A3250D7718A55DF95
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C5B09C: __EH_prolog.LIBCMT ref: 02C5B0A1
                                                                                                                    • __CxxThrowException@8.LIBCMT ref: 02C5BC66
                                                                                                                      • Part of subcall function 02C6449A: RaiseException.KERNEL32(?,?,02C5FA96,?,?,?,?,?,?,?,02C5FA96,?,02C80F78,?), ref: 02C644EF
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,02C81D94,?,00000001), ref: 02C5BC7C
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C5BC8F
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,?,?,02C81D94,?,00000001), ref: 02C5BC9F
                                                                                                                    • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 02C5BCAD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExchangeInterlocked$CompletionExceptionException@8H_prologObjectPostQueuedRaiseSingleStatusThrowWait
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2725315915-0
                                                                                                                    • Opcode ID: 1a5c6e0842c5fae374e6cb90c3b689c2923ab26306ede168114bd65bc13d3430
                                                                                                                    • Instruction ID: bc88b2b346a23ed36f9a9187a08a79001fb792a375c3a229391c72089d789fdc
                                                                                                                    • Opcode Fuzzy Hash: 1a5c6e0842c5fae374e6cb90c3b689c2923ab26306ede168114bd65bc13d3430
                                                                                                                    • Instruction Fuzzy Hash: F80186B2A40318AFDB10AEB4DC89F967BADFB04359F048515F615D7190DB60E8498B54
                                                                                                                    APIs
                                                                                                                    • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 02C52432
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C52445
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C52454
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52469
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C52470
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalExchangeInterlockedSection$CompareCompletionEnterLeavePostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 747265849-0
                                                                                                                    • Opcode ID: 789a2dc5511a30f1725347ec221d281c2606b37134e93356d9ca4236f0ec6768
                                                                                                                    • Instruction ID: bf849dca6ae688408fb9820c8493aa30177d6d9e54476aa39877eee25fe9f812
                                                                                                                    • Opcode Fuzzy Hash: 789a2dc5511a30f1725347ec221d281c2606b37134e93356d9ca4236f0ec6768
                                                                                                                    • Instruction Fuzzy Hash: FFF09072640218BFD7009BA0ED49FD6B72CFB44701F800511FB01D6080D761E569CBE5
                                                                                                                    APIs
                                                                                                                    • InterlockedIncrement.KERNEL32(?), ref: 02C51ED2
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(?,?,?,00000000,00000000,?), ref: 02C51EEA
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C51EF9
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C51F0E
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C51F15
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalInterlockedSection$CompletionEnterExchangeIncrementLeavePostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 830998967-0
                                                                                                                    • Opcode ID: 9f827eac5c9b982780cd7eaffdf65aa93fdd6ad13b83930bc69551f557b55c02
                                                                                                                    • Instruction ID: a81f4b0bcfa087e83172b975eb6e0fe7386fe91fc2a2354c531337b82d2430b8
                                                                                                                    • Opcode Fuzzy Hash: 9f827eac5c9b982780cd7eaffdf65aa93fdd6ad13b83930bc69551f557b55c02
                                                                                                                    • Instruction Fuzzy Hash: D6F01772641619BBDB00AFA1ED88FD6BB2CFF54355F000516F60186440DB65A66D8BE0
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 02C59A10: __EH_prolog.LIBCMT ref: 02C59A15
                                                                                                                      • Part of subcall function 02C59A10: _Allocate.LIBCPMT ref: 02C59A6C
                                                                                                                      • Part of subcall function 02C59A10: _memmove.LIBCMT ref: 02C59AC3
                                                                                                                    • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 02C608E2
                                                                                                                    • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 02C608EA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocateErrorFormatH_prologLastMessage_memmove
                                                                                                                    • String ID: Unknown error$invalid string position
                                                                                                                    • API String ID: 1017912131-1837348584
                                                                                                                    • Opcode ID: cb008b7efb97a649ddf1e4d3dd057f3b8c4a26499bb2c2a3da473975d26c865d
                                                                                                                    • Instruction ID: 2eeb44a6d27f49e8a39d4c9c18e128158cf40921bc6d3603e6ab9336bd1ae57e
                                                                                                                    • Opcode Fuzzy Hash: cb008b7efb97a649ddf1e4d3dd057f3b8c4a26499bb2c2a3da473975d26c865d
                                                                                                                    • Instruction Fuzzy Hash: 3651BC702483418FE714CF25C894B2EBBE5FBA8744F50092DF481A7692D771E688CF96
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _memmove
                                                                                                                    • String ID: invalid string position$string too long
                                                                                                                    • API String ID: 4104443479-4289949731
                                                                                                                    • Opcode ID: 6626c5da041c7cdb2760610721e79c5855487eaab888f87e1271f5bbc3c10149
                                                                                                                    • Instruction ID: 6d8aa4f6545ec79352e2020e015d56b08546e87d0b3c7a4b5f611bfc60b5b2ed
                                                                                                                    • Opcode Fuzzy Hash: 6626c5da041c7cdb2760610721e79c5855487eaab888f87e1271f5bbc3c10149
                                                                                                                    • Instruction Fuzzy Hash: 894196713017249FD724DE69DC84A56B7AAEF41794B000A2DFC56CB781CB70E9C4CB99
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 02C530C3
                                                                                                                    • WSAStringToAddressA.WS2_32(?,?,00000000,?,?), ref: 02C53102
                                                                                                                    • _memcmp.LIBCMT ref: 02C53141
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressErrorLastString_memcmp
                                                                                                                    • String ID: 255.255.255.255
                                                                                                                    • API String ID: 1618111833-2422070025
                                                                                                                    • Opcode ID: 800942c1ec65868cb27c832abdadad40046fb5418a8087b136a1726c13721ff7
                                                                                                                    • Instruction ID: 9024ae563f1a6545b31969a3a4390e7f9ad4d49b7c43acd585e562dc4c4af89e
                                                                                                                    • Opcode Fuzzy Hash: 800942c1ec65868cb27c832abdadad40046fb5418a8087b136a1726c13721ff7
                                                                                                                    • Instruction Fuzzy Hash: 5F31E4719003549FDB209F74CC84B6FB7A5FF813A4F1045A9EC6A9B280DB72DA858B94
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C51F5B
                                                                                                                    • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF,?,00000000), ref: 02C51FC5
                                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 02C51FD2
                                                                                                                      • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$CompletionCreateErrorLastPort
                                                                                                                    • String ID: iocp
                                                                                                                    • API String ID: 998023749-976528080
                                                                                                                    • Opcode ID: 2b7e41605bffbcdf82029dd20a5d4bdbd06ad9ec923c2484a71e5e9479157a4c
                                                                                                                    • Instruction ID: 3fc3c7e7b316b315c110f6bd769fd0d5fd3e2b58d3084dcc7196deddde70f9cd
                                                                                                                    • Opcode Fuzzy Hash: 2b7e41605bffbcdf82029dd20a5d4bdbd06ad9ec923c2484a71e5e9479157a4c
                                                                                                                    • Instruction Fuzzy Hash: 5321E7B1901B449FC720DF6AC50455BFBF8FF94720B108A1FE8A683A60D7B0A644CF91
                                                                                                                    APIs
                                                                                                                    • _malloc.LIBCMT ref: 02C63AA7
                                                                                                                      • Part of subcall function 02C62EEC: __FF_MSGBANNER.LIBCMT ref: 02C62F03
                                                                                                                      • Part of subcall function 02C62EEC: __NMSG_WRITE.LIBCMT ref: 02C62F0A
                                                                                                                      • Part of subcall function 02C62EEC: RtlAllocateHeap.NTDLL(00A20000,00000000,00000001), ref: 02C62F2F
                                                                                                                    • std::exception::exception.LIBCMT ref: 02C63AC5
                                                                                                                    • __CxxThrowException@8.LIBCMT ref: 02C63ADA
                                                                                                                      • Part of subcall function 02C6449A: RaiseException.KERNEL32(?,?,02C5FA96,?,?,?,?,?,?,?,02C5FA96,?,02C80F78,?), ref: 02C644EF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                                                                                    • String ID: bad allocation
                                                                                                                    • API String ID: 3074076210-2104205924
                                                                                                                    • Opcode ID: 057378e59605cf2d43c7b318ef7c3d2b6bf9a8a5af178ccea34fc467f5d55e6a
                                                                                                                    • Instruction ID: f10216727294198dd26f2422ffd60170cec83b4003bad1b785909d5eacbd9cab
                                                                                                                    • Opcode Fuzzy Hash: 057378e59605cf2d43c7b318ef7c3d2b6bf9a8a5af178ccea34fc467f5d55e6a
                                                                                                                    • Instruction Fuzzy Hash: 87E0E57094024EAADB10FFA0CC8D9BFBB6DAF00304F0045A1EC15A2580EB328704F9E1
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C537B6
                                                                                                                    • __localtime64.LIBCMT ref: 02C537C1
                                                                                                                      • Part of subcall function 02C62540: __gmtime64_s.LIBCMT ref: 02C62553
                                                                                                                    • std::exception::exception.LIBCMT ref: 02C537D9
                                                                                                                      • Part of subcall function 02C62413: std::exception::_Copy_str.LIBCMT ref: 02C6242C
                                                                                                                      • Part of subcall function 02C5A45F: __EH_prolog.LIBCMT ref: 02C5A464
                                                                                                                      • Part of subcall function 02C5A45F: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C5A473
                                                                                                                      • Part of subcall function 02C5A45F: __CxxThrowException@8.LIBCMT ref: 02C5A492
                                                                                                                    Strings
                                                                                                                    • could not convert calendar time to UTC time, xrefs: 02C537CE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Copy_strException@8FromImplThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                                                                                                                    • String ID: could not convert calendar time to UTC time
                                                                                                                    • API String ID: 1963798777-2088861013
                                                                                                                    • Opcode ID: b250a80cc0ccebf9fe269a3ff0d13c0bcba8ad3e2a60083c5fee4b6d463d557e
                                                                                                                    • Instruction ID: 03268764750415a0a72bfc0b1533d7ebe05572382409efef32db0b5e91c4e164
                                                                                                                    • Opcode Fuzzy Hash: b250a80cc0ccebf9fe269a3ff0d13c0bcba8ad3e2a60083c5fee4b6d463d557e
                                                                                                                    • Instruction Fuzzy Hash: B2E06DB1D0021A9BCB10EF90D9487FEB779FF04340F408599DC15A2550EB349605EE95
                                                                                                                    APIs
                                                                                                                    • VirtualFree.KERNEL32(?,00008000,00004000,74DEDFF0,?,00000000), ref: 00404092
                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004040ED
                                                                                                                    • HeapFree.KERNEL32(00000000,?), ref: 004040FF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Free$Virtual$Heap
                                                                                                                    • String ID: -@
                                                                                                                    • API String ID: 2016334554-2999422947
                                                                                                                    • Opcode ID: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                                                                    • Instruction ID: d55dda63c6158a3f001c35490e62a79414290c04420ce97baa52a0c06dad31a7
                                                                                                                    • Opcode Fuzzy Hash: 9c389c61e5a6cd43db9238f188d86346d40478f5c1fa1013f45f36ce2e9b1707
                                                                                                                    • Instruction Fuzzy Hash: D1B16C75A00205DFDB24CF04CA90AA9BBB1FB88314F24C1AED9196F396C735EE41CB84
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AdjustPointer_memmove
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1721217611-0
                                                                                                                    • Opcode ID: 2e62a3383ca619e171846b82a9842afe28d5c4a66a41cc5e438aa395f8bcd4fd
                                                                                                                    • Instruction ID: 099937cd4cbeb901c27619fee58c8e393fb25f7185a7e954483efbf5c6951285
                                                                                                                    • Opcode Fuzzy Hash: 2e62a3383ca619e171846b82a9842afe28d5c4a66a41cc5e438aa395f8bcd4fd
                                                                                                                    • Instruction Fuzzy Hash: 3B41C7772043039BEB289E65D8CCB7A33E69F41714F18841FE8C9865E1DB71E780DA11
                                                                                                                    APIs
                                                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,02C54149), ref: 02C612FF
                                                                                                                      • Part of subcall function 02C53FDC: __EH_prolog.LIBCMT ref: 02C53FE1
                                                                                                                      • Part of subcall function 02C53FDC: CreateEventA.KERNEL32(00000000,?,?,00000000), ref: 02C53FF3
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C612F4
                                                                                                                    • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,02C54149), ref: 02C61340
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,02C54149), ref: 02C61411
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle$Event$CreateH_prolog
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2825413587-0
                                                                                                                    • Opcode ID: 8ede543c90307aaebab7cfb0f1923de3449bff0121eb53f9dc1b9131d467fc64
                                                                                                                    • Instruction ID: b4cb5affc8edcfdc606953e158953cb1f12d7eaf1ca771887f1ec33e865d6c01
                                                                                                                    • Opcode Fuzzy Hash: 8ede543c90307aaebab7cfb0f1923de3449bff0121eb53f9dc1b9131d467fc64
                                                                                                                    • Instruction Fuzzy Hash: BB51BD716047458BDF21DF28C8C87AAB7E4BF8832AF1D0628E86E97390D775D905CB91
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2782032738-0
                                                                                                                    • Opcode ID: acdac2ea7175f400f5f91947118356792f48efd8ea4696cdf33623925e283fbc
                                                                                                                    • Instruction ID: 133cd3ce343d53b78694100cd124192e12d7d178249b94a2582922bb2cf43fac
                                                                                                                    • Opcode Fuzzy Hash: acdac2ea7175f400f5f91947118356792f48efd8ea4696cdf33623925e283fbc
                                                                                                                    • Instruction Fuzzy Hash: 1441D7B5A007859FDB188FA9C9CC5BE77A6AF84B64B1481BDE815CB280DB70DA41CB44
                                                                                                                    APIs
                                                                                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 02C6FE8B
                                                                                                                    • __isleadbyte_l.LIBCMT ref: 02C6FEB9
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,00000000,00000000), ref: 02C6FEE7
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,00000000,00000000), ref: 02C6FF1D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3058430110-0
                                                                                                                    • Opcode ID: bd3c43c0ff39c05e0735231d732e05e2c16c58747fe9fbe1791d19b9dacbc866
                                                                                                                    • Instruction ID: 0e33685c1b649256b5003e57742e6135b64833291a72832e8523fd4f82aa08d7
                                                                                                                    • Opcode Fuzzy Hash: bd3c43c0ff39c05e0735231d732e05e2c16c58747fe9fbe1791d19b9dacbc866
                                                                                                                    • Instruction Fuzzy Hash: C5310131600286AFDB218EB9DCC8BBA7FE9FF81314F15412CE82A87991D731D951DB90
                                                                                                                    APIs
                                                                                                                    • VirtualFree.KERNEL32(FFFFFFFF,00001000,00004000,74DEDFF0,?,00000000,?,-@,0040490E,00000010,00402FA3,?,?), ref: 004047F0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeVirtual
                                                                                                                    • String ID: -@$r@$r@
                                                                                                                    • API String ID: 1263568516-1251997348
                                                                                                                    • Opcode ID: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                                                                    • Instruction ID: a63ca1888fca441bf056fbcf5d5deb39584b298cc2094c54b415f4e68fc1e946
                                                                                                                    • Opcode Fuzzy Hash: db728298b98a3dab2ecdb4dab480861bd9016d5beafec50a15f5b98851f5bcbc
                                                                                                                    • Instruction Fuzzy Hash: EE21A1B66003419BDB20AB24DD4476633A4EB81379F24CA3BDB65B66D0D378E941CB58
                                                                                                                    APIs
                                                                                                                    • htons.WS2_32(?), ref: 02C53DA2
                                                                                                                      • Part of subcall function 02C53BD3: __EH_prolog.LIBCMT ref: 02C53BD8
                                                                                                                      • Part of subcall function 02C53BD3: std::bad_exception::bad_exception.LIBCMT ref: 02C53BED
                                                                                                                    • htonl.WS2_32(00000000), ref: 02C53DB9
                                                                                                                    • htonl.WS2_32(00000000), ref: 02C53DC0
                                                                                                                    • htons.WS2_32(?), ref: 02C53DD4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3882411702-0
                                                                                                                    • Opcode ID: cf48a04b6ba34524857db92306b7d8d74f12c4b90050613d5b322ba9eea78bf1
                                                                                                                    • Instruction ID: cabbf2cb6b0ce0c39ce60c53de0afd227c451c439105845b0eff8f4709320a05
                                                                                                                    • Opcode Fuzzy Hash: cf48a04b6ba34524857db92306b7d8d74f12c4b90050613d5b322ba9eea78bf1
                                                                                                                    • Instruction Fuzzy Hash: B211A535910259EFCF019F64D885A5AB7B9FF49310F0084A6FC08DF205D771DA58CBA5
                                                                                                                    APIs
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000), ref: 02C523D0
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C523DE
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C52401
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C52408
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4018804020-0
                                                                                                                    • Opcode ID: 59d85c805f7801bd6379d48692cbad6e7d26ea3efb7e8c4d4d6aeb09daa83681
                                                                                                                    • Instruction ID: ec183f602299a9f09d5fb67d65d298f25e393adafac7bbe3658573563e22ca3f
                                                                                                                    • Opcode Fuzzy Hash: 59d85c805f7801bd6379d48692cbad6e7d26ea3efb7e8c4d4d6aeb09daa83681
                                                                                                                    • Instruction Fuzzy Hash: 3E11CE32A00204ABDB109F61D884B66BBB8FF80705F10446DED019B140E7B1F999CBA1
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3016257755-0
                                                                                                                    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                                    • Instruction ID: 06f3bbb14d157c84782ea247c72fe588726f7412824f6bcefa1b3f16dd8705aa
                                                                                                                    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                                                    • Instruction Fuzzy Hash: 1601027200014EBBCF126E84DC898EE3F67BB5C355B458416FA5895131D736C671AB81
                                                                                                                    APIs
                                                                                                                    • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?), ref: 02C524A9
                                                                                                                    • RtlEnterCriticalSection.NTDLL(?), ref: 02C524B8
                                                                                                                    • InterlockedExchange.KERNEL32(?,00000001), ref: 02C524CD
                                                                                                                    • RtlLeaveCriticalSection.NTDLL(?), ref: 02C524D4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$CompletionEnterExchangeInterlockedLeavePostQueuedStatus
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4018804020-0
                                                                                                                    • Opcode ID: 9293b37cfb7508345e1cad5f7db8f2ee3bac70d9e8c14d342279910a85a2cf96
                                                                                                                    • Instruction ID: b88da881b289e151099097e4e9389efd6ffd80b5a8473e6bcffd3b86da03adf9
                                                                                                                    • Opcode Fuzzy Hash: 9293b37cfb7508345e1cad5f7db8f2ee3bac70d9e8c14d342279910a85a2cf96
                                                                                                                    • Instruction Fuzzy Hash: E3F03C72540209AFDB009F69EC84F9ABBACFF44711F004519FA05D6141D771E5688FA1
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C52009
                                                                                                                    • RtlDeleteCriticalSection.NTDLL(?), ref: 02C52028
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C52037
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 02C5204E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle$CriticalDeleteH_prologSection
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2456309408-0
                                                                                                                    • Opcode ID: 27221b8d859ac86c252b81b647447d58852ef484a967f3be1d83920b9c977298
                                                                                                                    • Instruction ID: ec7d4114c5beaeeac290e948119e4ceac9b6357b4518039b9353cb35f372a8e9
                                                                                                                    • Opcode Fuzzy Hash: 27221b8d859ac86c252b81b647447d58852ef484a967f3be1d83920b9c977298
                                                                                                                    • Instruction Fuzzy Hash: 92016D719016149BC7249F54E908BAAB7F5FF44704F004A5DEC4682590CB74A68DCF99
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Event$H_prologSleep
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1765829285-0
                                                                                                                    • Opcode ID: 1774ddeb768d94df41512412d0a6015fd88b5bfb01c4e23af5b20d08e8914183
                                                                                                                    • Instruction ID: f54256a2cddba7e47286c07ac2a4387c6646c4695f2b38bd0513c7800d87ef2f
                                                                                                                    • Opcode Fuzzy Hash: 1774ddeb768d94df41512412d0a6015fd88b5bfb01c4e23af5b20d08e8914183
                                                                                                                    • Instruction Fuzzy Hash: D9F05E36640114EFCF009FA4D8C8B88BBA4FF0D321F5082A9FA19DB290C7759858CBA1
                                                                                                                    APIs
                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,r@,0040485C,r@,74DEDFF0,?,00000000,?,-@,0040490E,00000010,00402FA3), ref: 0040476B
                                                                                                                    • HeapFree.KERNEL32(00000000,?), ref: 004047A1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Free$HeapVirtual
                                                                                                                    • String ID: r@$r@
                                                                                                                    • API String ID: 3783212868-1712950306
                                                                                                                    • Opcode ID: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                                                                    • Instruction ID: 9f28707f468f96f8ba01f1c404cbd9d3f6c084a3717c71e7c0065962692db169
                                                                                                                    • Opcode Fuzzy Hash: 615be266f2133a35edff91ca5e545c140f31fce35e26d2f64644c01e7612d901
                                                                                                                    • Instruction Fuzzy Hash: C6F01774544210DFC3248F08EE08A427BA0FB88720B11867EF996672E1C371AC50CF88
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog_memmove
                                                                                                                    • String ID: &'
                                                                                                                    • API String ID: 3529519853-655172784
                                                                                                                    • Opcode ID: 3001fefb03d334dd029eaf212067cd0cd1ab2bc0a38e190a3ff2c10b0d4f7452
                                                                                                                    • Instruction ID: 521363e4905ee4692be3500cdfe43dfbd238bf2b063bdd690f23da8b2f0ca770
                                                                                                                    • Opcode Fuzzy Hash: 3001fefb03d334dd029eaf212067cd0cd1ab2bc0a38e190a3ff2c10b0d4f7452
                                                                                                                    • Instruction Fuzzy Hash: C2619E71D00229DBDF20DFA5C980BEEBBB6AF48310F1042A9D809AB150D771DA85DFA4
                                                                                                                    APIs
                                                                                                                    • GetCPInfo.KERNEL32(?,00000000), ref: 00404ED1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Info
                                                                                                                    • String ID: $
                                                                                                                    • API String ID: 1807457897-3032137957
                                                                                                                    • Opcode ID: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                                                                    • Instruction ID: e64d793a5bd47a750bf71bc710b27f1b951018593c94bf49e3c2bba34da37a12
                                                                                                                    • Opcode Fuzzy Hash: ade2e129719512a706aeac876f0a8c01095c6a06ec5d81e25aee3eb1febfb5f9
                                                                                                                    • Instruction Fuzzy Hash: 1D416B710142985EEB169714CE59FEB3FE8EB02704F1404F6DA49F61D2C2794924DBBB
                                                                                                                    APIs
                                                                                                                    • WSASetLastError.WS2_32(00000000,?,?,?,?,?,?,?,02C5830A,?,?,00000000), ref: 02C59607
                                                                                                                    • getsockname.WS2_32(?,?,?), ref: 02C5961D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastgetsockname
                                                                                                                    • String ID: &'
                                                                                                                    • API String ID: 566540725-655172784
                                                                                                                    • Opcode ID: e515a97f9fbd41f06feb3082e50627ca353e3c9c32073204f9a4bc2561571e37
                                                                                                                    • Instruction ID: c0509223cf1596f39fef734482d165697cb3501fce383e2b84c0df7e1a197daf
                                                                                                                    • Opcode Fuzzy Hash: e515a97f9fbd41f06feb3082e50627ca353e3c9c32073204f9a4bc2561571e37
                                                                                                                    • Instruction Fuzzy Hash: 24218E72A00208DBDB10DF69D844ADEB7F5FF48324F10856AED18EB281EB30E9458B94
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5CBEB
                                                                                                                      • Part of subcall function 02C5D1C7: std::exception::exception.LIBCMT ref: 02C5D1F6
                                                                                                                      • Part of subcall function 02C5D97D: __EH_prolog.LIBCMT ref: 02C5D982
                                                                                                                      • Part of subcall function 02C63A8F: _malloc.LIBCMT ref: 02C63AA7
                                                                                                                      • Part of subcall function 02C5D226: __EH_prolog.LIBCMT ref: 02C5D22B
                                                                                                                    Strings
                                                                                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 02C5CC21
                                                                                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C5CC28
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                                                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                                                                                                    • API String ID: 1953324306-1943798000
                                                                                                                    • Opcode ID: e3bf77a520283a1cf87cbb4abee481f0cf34807e553df3b97dbf3afab9f93d49
                                                                                                                    • Instruction ID: 53d805f282b6f5c5d9120b7e4d9567ba39a7437a71bc89cc00f2b72862e6d509
                                                                                                                    • Opcode Fuzzy Hash: e3bf77a520283a1cf87cbb4abee481f0cf34807e553df3b97dbf3afab9f93d49
                                                                                                                    • Instruction Fuzzy Hash: CA21D0B5E00264DBDB14EFE8E8446AEBBB9EF54704F10415EEC06AB240DB70AA84DB55
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5CCE0
                                                                                                                      • Part of subcall function 02C5D29E: std::exception::exception.LIBCMT ref: 02C5D2CB
                                                                                                                      • Part of subcall function 02C5DAB4: __EH_prolog.LIBCMT ref: 02C5DAB9
                                                                                                                      • Part of subcall function 02C63A8F: _malloc.LIBCMT ref: 02C63AA7
                                                                                                                      • Part of subcall function 02C5D2FB: __EH_prolog.LIBCMT ref: 02C5D300
                                                                                                                    Strings
                                                                                                                    • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 02C5CD16
                                                                                                                    • C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp, xrefs: 02C5CD1D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$_mallocstd::exception::exception
                                                                                                                    • String ID: C:\boost_1_55_0\staging\include\boost-1_55\boost/exception/detail/exception_ptr.hpp$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                                                                                                    • API String ID: 1953324306-412195191
                                                                                                                    • Opcode ID: 7883a3ee1d4ed2fad66b088c26fdd105c6f29ebac31c70466fc74a5ab5f5d958
                                                                                                                    • Instruction ID: c76d0fd9ce726695b4f5c861871be5adf14e6dc936b9676a41891584a25ff94d
                                                                                                                    • Opcode Fuzzy Hash: 7883a3ee1d4ed2fad66b088c26fdd105c6f29ebac31c70466fc74a5ab5f5d958
                                                                                                                    • Instruction Fuzzy Hash: EF21B1B5E003A8DBDB04EFE4D884BAEBBB5EF54300F10455DEC06A7240DB709A84DB95
                                                                                                                    APIs
                                                                                                                    • _malloc.LIBCMT ref: 02C5535D
                                                                                                                      • Part of subcall function 02C62EEC: __FF_MSGBANNER.LIBCMT ref: 02C62F03
                                                                                                                      • Part of subcall function 02C62EEC: __NMSG_WRITE.LIBCMT ref: 02C62F0A
                                                                                                                      • Part of subcall function 02C62EEC: RtlAllocateHeap.NTDLL(00A20000,00000000,00000001), ref: 02C62F2F
                                                                                                                    • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000), ref: 02C5536F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocateFolderHeapPathSpecial_malloc
                                                                                                                    • String ID: \save.dat
                                                                                                                    • API String ID: 4128168839-3580179773
                                                                                                                    • Opcode ID: f712c43f64476b485464b125333f314f91509d5c33eaa02adc167dcb5db58d6d
                                                                                                                    • Instruction ID: c314031ffbf6a8aa706dffac894209bcda77e5e1eca9681c77950bdfbaec3f5e
                                                                                                                    • Opcode Fuzzy Hash: f712c43f64476b485464b125333f314f91509d5c33eaa02adc167dcb5db58d6d
                                                                                                                    • Instruction Fuzzy Hash: 7F117D729042542BDB218E658CC4A6FFF6BDF82A50B1001A9EC4D67202D6A34E06C6A0
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5396A
                                                                                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02C539C1
                                                                                                                      • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                                                                      • Part of subcall function 02C5A555: __EH_prolog.LIBCMT ref: 02C5A55A
                                                                                                                      • Part of subcall function 02C5A555: Concurrency::cancellation_token::_FromImpl.LIBCPMT ref: 02C5A569
                                                                                                                      • Part of subcall function 02C5A555: __CxxThrowException@8.LIBCMT ref: 02C5A588
                                                                                                                    Strings
                                                                                                                    • Day of month is not valid for year, xrefs: 02C539AC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$Concurrency::cancellation_token::_Exception@8FromImplThrowstd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                                    • String ID: Day of month is not valid for year
                                                                                                                    • API String ID: 1404951899-1521898139
                                                                                                                    • Opcode ID: eba80bd344a12f75718bfe6ddfb4072f8d8453fb5a6af1f5c4b4ba878a4714cf
                                                                                                                    • Instruction ID: a97a42747c0a981608e5cd20eee295668d688b4f6704052cad8f3ad885683c9c
                                                                                                                    • Opcode Fuzzy Hash: eba80bd344a12f75718bfe6ddfb4072f8d8453fb5a6af1f5c4b4ba878a4714cf
                                                                                                                    • Instruction Fuzzy Hash: F501D876810219AEDF04EFE4D805AEEBB79FF14710F40411AEC0493300EB708A95DB99
                                                                                                                    APIs
                                                                                                                    • std::exception::exception.LIBCMT ref: 02C5FA4E
                                                                                                                    • __CxxThrowException@8.LIBCMT ref: 02C5FA63
                                                                                                                      • Part of subcall function 02C63A8F: _malloc.LIBCMT ref: 02C63AA7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Exception@8Throw_mallocstd::exception::exception
                                                                                                                    • String ID: bad allocation
                                                                                                                    • API String ID: 4063778783-2104205924
                                                                                                                    • Opcode ID: ca50f9cb085704ca44ae36d9c6de8adfd9a1bad9e171897bd4e2af573b146d9d
                                                                                                                    • Instruction ID: 41be5915801a6b6409cf50001dc9781c8d18f49030615ef39ea3a9cec9700056
                                                                                                                    • Opcode Fuzzy Hash: ca50f9cb085704ca44ae36d9c6de8adfd9a1bad9e171897bd4e2af573b146d9d
                                                                                                                    • Instruction Fuzzy Hash: 43F02EF060031D56DF04EA9489459BF77ECAF40314F400569E921E35C2EF70EA4455D9
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C53C1B
                                                                                                                    • std::bad_exception::bad_exception.LIBCMT ref: 02C53C30
                                                                                                                      • Part of subcall function 02C623F7: std::exception::exception.LIBCMT ref: 02C62401
                                                                                                                      • Part of subcall function 02C5A58E: __EH_prolog.LIBCMT ref: 02C5A593
                                                                                                                      • Part of subcall function 02C5A58E: __CxxThrowException@8.LIBCMT ref: 02C5A5BC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                    • String ID: bad cast
                                                                                                                    • API String ID: 1300498068-3145022300
                                                                                                                    • Opcode ID: 8825b59bc4b10dec6c2c52097a3bee6db06c4b500771a0bf77c86b0341ea936f
                                                                                                                    • Instruction ID: e1b3d0ed17fc3fc27d443a7a64e2fd29b4637f4055211814eb01533bfbb5ab6e
                                                                                                                    • Opcode Fuzzy Hash: 8825b59bc4b10dec6c2c52097a3bee6db06c4b500771a0bf77c86b0341ea936f
                                                                                                                    • Instruction Fuzzy Hash: 58F055729005048BC708EF48D440AEAB779EF51311F0001BEED0A5B280CB72DA46DAD1
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C538D2
                                                                                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02C538F1
                                                                                                                      • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                                                                      • Part of subcall function 02C588C3: _memmove.LIBCMT ref: 02C588E3
                                                                                                                    Strings
                                                                                                                    • Year is out of valid range: 1400..10000, xrefs: 02C538E0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                                    • String ID: Year is out of valid range: 1400..10000
                                                                                                                    • API String ID: 3258419250-2344417016
                                                                                                                    • Opcode ID: 91b9b661b3bff746846c47a6ef40cb9e6d7089c5e43c251edcdfbe5027f14189
                                                                                                                    • Instruction ID: 50a959b51f8d2945de457ec3085c180c4bda79cbce94e3c03c7dec58afb356a5
                                                                                                                    • Opcode Fuzzy Hash: 91b9b661b3bff746846c47a6ef40cb9e6d7089c5e43c251edcdfbe5027f14189
                                                                                                                    • Instruction Fuzzy Hash: 0AE092B2E4411497DB14EFA88815BEDBB69DB08720F00055ADC0567280DAB15984DB99
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C53886
                                                                                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02C538A5
                                                                                                                      • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                                                                      • Part of subcall function 02C588C3: _memmove.LIBCMT ref: 02C588E3
                                                                                                                    Strings
                                                                                                                    • Day of month value is out of range 1..31, xrefs: 02C53894
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                                    • String ID: Day of month value is out of range 1..31
                                                                                                                    • API String ID: 3258419250-1361117730
                                                                                                                    • Opcode ID: 1c34533606ebd5605f5edd8d3894b513304d4b06a0aa41328b756a5286a4153a
                                                                                                                    • Instruction ID: 395c8ac90613283cbd2c087fa8b80832dbd685afdae5831b60ee0f803e0de491
                                                                                                                    • Opcode Fuzzy Hash: 1c34533606ebd5605f5edd8d3894b513304d4b06a0aa41328b756a5286a4153a
                                                                                                                    • Instruction Fuzzy Hash: 01E06872E0011097D714AFD48C01BECBB78DF08B10F40014EDC0177280CBF158849BD8
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C5391E
                                                                                                                    • std::runtime_error::runtime_error.LIBCPMT ref: 02C5393D
                                                                                                                      • Part of subcall function 02C51410: std::exception::exception.LIBCMT ref: 02C51428
                                                                                                                      • Part of subcall function 02C588C3: _memmove.LIBCMT ref: 02C588E3
                                                                                                                    Strings
                                                                                                                    • Month number is out of range 1..12, xrefs: 02C5392C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog_memmovestd::exception::exceptionstd::runtime_error::runtime_error
                                                                                                                    • String ID: Month number is out of range 1..12
                                                                                                                    • API String ID: 3258419250-4198407886
                                                                                                                    • Opcode ID: b439c946eb862072245f901a1351d3cf7c815d34a59e584058efe95800bc2877
                                                                                                                    • Instruction ID: 12806c1062cf381f1c10a25fc808c10cffa42a693d76957e99fd0beebe04503e
                                                                                                                    • Opcode Fuzzy Hash: b439c946eb862072245f901a1351d3cf7c815d34a59e584058efe95800bc2877
                                                                                                                    • Instruction Fuzzy Hash: A3E0D872E4011497D714BFE48C15BEDBB79EF18710F40055ADC0577280DBF169849BD9
                                                                                                                    APIs
                                                                                                                    • TlsAlloc.KERNEL32 ref: 02C519CC
                                                                                                                    • GetLastError.KERNEL32 ref: 02C519D9
                                                                                                                      • Part of subcall function 02C51712: __EH_prolog.LIBCMT ref: 02C51717
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocErrorH_prologLast
                                                                                                                    • String ID: tss
                                                                                                                    • API String ID: 249634027-1638339373
                                                                                                                    • Opcode ID: 35fcc2711ad4f314886d66ca5f63cc7dea94f2d82f6a6032c43add8b03e5b076
                                                                                                                    • Instruction ID: be4185068072458639ca00c77fd9e8dd9f8536cb1add84eab31c35b0bc50ba9a
                                                                                                                    • Opcode Fuzzy Hash: 35fcc2711ad4f314886d66ca5f63cc7dea94f2d82f6a6032c43add8b03e5b076
                                                                                                                    • Instruction Fuzzy Hash: 07E08631D442245BC3007B78D80C19BBBA4AA40274F108B66ECBD832D0EB3089549FC6
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 02C53BD8
                                                                                                                    • std::bad_exception::bad_exception.LIBCMT ref: 02C53BED
                                                                                                                      • Part of subcall function 02C623F7: std::exception::exception.LIBCMT ref: 02C62401
                                                                                                                      • Part of subcall function 02C5A58E: __EH_prolog.LIBCMT ref: 02C5A593
                                                                                                                      • Part of subcall function 02C5A58E: __CxxThrowException@8.LIBCMT ref: 02C5A5BC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2950772508.0000000002C51000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C51000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_2c51000_playglock.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog$Exception@8Throwstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                                    • String ID: bad cast
                                                                                                                    • API String ID: 1300498068-3145022300
                                                                                                                    • Opcode ID: aeda84a14a9891749f7bbf77f583c10cb02d36e735fd9652d8ed5267d1260df7
                                                                                                                    • Instruction ID: 0e2d392362401f79a22acb3157880a04e705a531eb00a13259c4bafaa708e754
                                                                                                                    • Opcode Fuzzy Hash: aeda84a14a9891749f7bbf77f583c10cb02d36e735fd9652d8ed5267d1260df7
                                                                                                                    • Instruction Fuzzy Hash: 63E04F71900149DBC718EF54D541BBCB775EF54340F4081ADDD0A5B2D0CB319A55DE96
                                                                                                                    APIs
                                                                                                                    • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 00404494
                                                                                                                    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044C8
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044E2
                                                                                                                    • HeapFree.KERNEL32(00000000,?,?,00000000,00404234,?,?,?,00000100,?,00000000), ref: 004044F9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000002.00000002.2949656237.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 00000002.00000002.2949656237.0000000000409000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_2_2_400000_playglock.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocHeap$FreeVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3499195154-0
                                                                                                                    • Opcode ID: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                                                                    • Instruction ID: 6532d2b8740b88ca5c68c93f46193dcc45771cdeba7f909f778517217a69801f
                                                                                                                    • Opcode Fuzzy Hash: 03264f3b7f6a3c24648121467edc173d78a87d9b85cb2d8b679f40e74ce8d20c
                                                                                                                    • Instruction Fuzzy Hash: 02113670200301AFC731CF29EE45A627BB5FB847207104A3AF252E65F0D775A866EF19